Implement Fireflies.ai webhook signature validation and event handling. Use when setting up webhook endpoints, implementing signature verification, or handling Fireflies.ai event notifications securely. Trigger with phrases like "fireflies webhook", "fireflies events", "fireflies webhook signature", "handle fireflies events", "fireflies notifications".
View on GitHubjeremylongshore/claude-code-plugins-plus-skills
fireflies-pack
plugins/saas-packs/fireflies-pack/skills/fireflies-webhooks-events/SKILL.md
February 1, 2026
Select agents to install to:
npx add-skill https://github.com/jeremylongshore/claude-code-plugins-plus-skills/blob/main/plugins/saas-packs/fireflies-pack/skills/fireflies-webhooks-events/SKILL.md -a claude-code --skill fireflies-webhooks-eventsInstallation paths:
.claude/skills/fireflies-webhooks-events/# Fireflies.ai Webhooks & Events
## Overview
Securely handle Fireflies.ai webhooks with signature validation and replay protection.
## Prerequisites
- Fireflies.ai webhook secret configured
- HTTPS endpoint accessible from internet
- Understanding of cryptographic signatures
- Redis or database for idempotency (optional)
## Webhook Endpoint Setup
### Express.js
```typescript
import express from 'express';
import crypto from 'crypto';
const app = express();
// IMPORTANT: Raw body needed for signature verification
app.post('/webhooks/fireflies',
express.raw({ type: 'application/json' }),
async (req, res) => {
const signature = req.headers['x-fireflies-signature'] as string;
const timestamp = req.headers['x-fireflies-timestamp'] as string;
if (!verifyFireflies.aiSignature(req.body, signature, timestamp)) {
return res.status(401).json({ error: 'Invalid signature' });
}
const event = JSON.parse(req.body.toString());
await handleFireflies.aiEvent(event);
res.status(200).json({ received: true });
}
);
```
## Signature Verification
```typescript
function verifyFireflies.aiSignature(
payload: Buffer,
signature: string,
timestamp: string
): boolean {
const secret = process.env.FIREFLIES_WEBHOOK_SECRET!;
// Reject old timestamps (replay attack protection)
const timestampAge = Date.now() - parseInt(timestamp) * 1000;
if (timestampAge > 300000) { // 5 minutes
console.error('Webhook timestamp too old');
return false;
}
// Compute expected signature
const signedPayload = `${timestamp}.${payload.toString()}`;
const expectedSignature = crypto
.createHmac('sha256', secret)
.update(signedPayload)
.digest('hex');
// Timing-safe comparison
return crypto.timingSafeEqual(
Buffer.from(signature),
Buffer.from(expectedSignature)
);
}
```
## Event Handler Pattern
```typescript
type Fireflies.aiEventType = 'resource.created' | 'resource.updated' | 'resource.deleted';
interface Firef