Skip to main content
availability

Package: Invicti AppSec Core (on-demand), Invicti AppSec Enterprise (on-premise, on-demand)

Webhook Integration

Webhook is a generic HTTP callback mechanism that allows Invicti AppSec to send real-time event data to any external system that exposes an HTTP endpoint. Unlike tool-specific integrations, the Webhook integration is flexible and can connect to custom applications, internal dashboards, automation platforms (such as Zapier or Make), or any other system capable of receiving HTTP POST requests.

Purpose in Invicti AppSec

Webhook is used in Invicti AppSec as an Issue Manager — enabling automated event-driven notifications and ticket creation workflows in external systems via HTTP callbacks.

Use CaseDescription
Custom integrationsSend vulnerability data to internal tools, dashboards, or custom applications that accept HTTP webhooks
Automation pipelinesTrigger automated workflows in platforms such as Zapier, Make (Integromat), or n8n when vulnerabilities are detected
Security alertingPush real-time security events to SIEM systems or custom alerting endpoints

Where It Is Used

PageNavigation PathPurpose
Integrations — Issue ManagersIntegrations › Issue ManagersAdmin activation and global configuration
Project SettingsProject › Settings › Issue ManagersLink the webhook to a specific project
Vulnerability ListProject › VulnerabilitiesManually trigger a webhook for a specific vulnerability
Team Lead IntegrationsTeam Lead view › Integrations › Issue ManagersTeam leads activate instances delegated by admins

Prerequisites

Before activating the integration, prepare the following:

FieldDescriptionRequired
Secret TokenA secret string used to validate incoming webhook requests. Invicti AppSec sends this value in the X-Invicti-Secret HTTP header with each requestNo (recommended)
URLThe full URL of the endpoint that will receive the webhook payload (e.g., https://hooks.yourapp.com/invicti)Yes
InsecureEnable only if the endpoint uses a self-signed SSL certificateNo

Obtain Credentials

Endpoint URL:

  1. Identify or create the HTTP endpoint in your external system that will receive webhook payloads.
  2. The endpoint must accept POST requests with a JSON body.
  3. Copy the full URL including the protocol (e.g., https://hooks.yourapp.com/endpoint).

Secret Token:

  1. Generate a secure random string to use as the shared secret (e.g., using a password manager or openssl rand -hex 32).
  2. Configure your receiving endpoint to validate the X-Kondukto-Secret header using this same value.
  3. This step is optional but strongly recommended to prevent unauthorized requests.

Activation Steps

Step 1: Navigate to Integrations

From the left sidebar, click Integrations.

Step 2: Open the Issue Managers Tab

On the Integrations page, click the Issue Managers tab.

Issue Manager tab

Step 3: Find and Activate Webhook

Locate the Webhook card.

  • If it is not yet activated, click Activate to open the settings drawer.
  • If it is already activated, click the gear icon to reconfigure.

Step 4: Fill In the Required Fields

In the settings drawer, enter the required information:

FieldDescriptionRequired
Secret TokenShared secret sent in the X-Invicti-Secret header for payload validationNo
URLThe full URL of your webhook receiver endpointYes
InsecureEnable for self-signed SSL certificatesNo

Step 5: Test the Connection

Click Test Connection. A green "Connection successful" message confirms that Invicti AppSec can reach the webhook endpoint.

Webhook settings

Step 6: Save

Click Save to complete the activation.

Summary

StepAction
1Navigate to Integrations from the sidebar
2Select the Issue Managers tab
3Find Webhook and click Activate (or the gear icon)
4Enter the Secret Token (recommended) and URL
5Click Test Connection — verify the success message
6Click Save

Troubleshooting

IssueResolution
Connection failedVerify the endpoint URL is correct and publicly reachable from the Invicti AppSec network. Check firewall rules and ensure the endpoint is running.
Endpoint returns 4xxCheck that the endpoint accepts POST requests and does not require additional authentication headers beyond the secret token.
Secret token mismatchEnsure the receiving endpoint validates the X-Invicti-Secret header using the exact same token configured in Invicti AppSec.
SSL / certificate errorEnable the Insecure option for self-signed certificates, or add the certificate to your trust store.
No payload receivedConfirm that the endpoint URL is correct, the service is running, and no intermediary (e.g., API gateway) is blocking the request.

Need help?

Invicti Support team is ready to provide you with technical help. Go to Help Center

Was this page useful?