Implement Perplexity webhook signature validation and event handling. Use when setting up webhook endpoints, implementing signature verification, or handling Perplexity event notifications securely. Trigger with phrases like "perplexity webhook", "perplexity events", "perplexity webhook signature", "handle perplexity events", "perplexity notifications".
View on GitHubjeremylongshore/claude-code-plugins-plus-skills
perplexity-pack
plugins/saas-packs/perplexity-pack/skills/perplexity-webhooks-events/SKILL.md
February 1, 2026
Select agents to install to:
npx add-skill https://github.com/jeremylongshore/claude-code-plugins-plus-skills/blob/main/plugins/saas-packs/perplexity-pack/skills/perplexity-webhooks-events/SKILL.md -a claude-code --skill perplexity-webhooks-eventsInstallation paths:
.claude/skills/perplexity-webhooks-events/# Perplexity Webhooks & Events
## Overview
Securely handle Perplexity webhooks with signature validation and replay protection.
## Prerequisites
- Perplexity webhook secret configured
- HTTPS endpoint accessible from internet
- Understanding of cryptographic signatures
- Redis or database for idempotency (optional)
## Webhook Endpoint Setup
### Express.js
```typescript
import express from 'express';
import crypto from 'crypto';
const app = express();
// IMPORTANT: Raw body needed for signature verification
app.post('/webhooks/perplexity',
express.raw({ type: 'application/json' }),
async (req, res) => {
const signature = req.headers['x-perplexity-signature'] as string;
const timestamp = req.headers['x-perplexity-timestamp'] as string;
if (!verifyPerplexitySignature(req.body, signature, timestamp)) {
return res.status(401).json({ error: 'Invalid signature' });
}
const event = JSON.parse(req.body.toString());
await handlePerplexityEvent(event);
res.status(200).json({ received: true });
}
);
```
## Signature Verification
```typescript
function verifyPerplexitySignature(
payload: Buffer,
signature: string,
timestamp: string
): boolean {
const secret = process.env.PERPLEXITY_WEBHOOK_SECRET!;
// Reject old timestamps (replay attack protection)
const timestampAge = Date.now() - parseInt(timestamp) * 1000;
if (timestampAge > 300000) { // 5 minutes
console.error('Webhook timestamp too old');
return false;
}
// Compute expected signature
const signedPayload = `${timestamp}.${payload.toString()}`;
const expectedSignature = crypto
.createHmac('sha256', secret)
.update(signedPayload)
.digest('hex');
// Timing-safe comparison
return crypto.timingSafeEqual(
Buffer.from(signature),
Buffer.from(expectedSignature)
);
}
```
## Event Handler Pattern
```typescript
type PerplexityEventType = 'resource.created' | 'resource.updated' | 'resource.deleted';
interface PerplexityEvent