Deliveries, Testing, and Automation
Use these endpoints to validate webhook endpoints, inspect delivery outcomes, and manage outbound automations.Workspace webhook operations
POST /api/webhooks-manage/:id/testPOST /api/webhooks-manage/:id/enableGET /api/webhooks-manage/:id/deliveries
Link webhook operations
POST /api/links/:linkId/webhooks/:webhookId/testPOST /api/links/:linkId/webhooks/:webhookId/redeliver/:deliveryIdPOST /api/links/:linkId/webhooks/:webhookId/rotate-secretGET /api/links/:linkId/webhooks/:webhookId/deliveriesGET /api/links/:linkId/webhooks/:webhookId/deliveries/:deliveryId
Outbound automation operations
GET /api/integrations/outboundGET /api/integrations/outbound/eventsPOST /api/integrations/outboundGET /api/integrations/outbound/:idPATCH /api/integrations/outbound/:idDELETE /api/integrations/outbound/:idPOST /api/integrations/outbound/:id/testGET /api/integrations/outbound/:id/deliveries
/api-reference/webhooks/event-types
Security and signing
- Workspace and link webhook secrets are not fully exposed on normal read responses.
- Outbound and test deliveries are signed with Svix/Standard Webhooks headers:
svix-idsvix-timestampsvix-signature- and unbranded aliases (
webhook-id,webhook-timestamp,webhook-signature)
- Secret rotation is supported for link webhooks.
Testing workflow
- Create webhook and confirm destination URL is reachable.
- Trigger test endpoint.
- Inspect delivery status code, response body, and response time.
- Use redelivery for failed link-webhook deliveries.
- Re-enable disabled webhook after fixing endpoint issues.
Permissions and gates
- Workspace/link webhook operations follow link permission families.
- Outbound read/mutate uses
webhooks:readandwebhooks:manage. - Outbound mutations are integration-feature gated.
Common errors
400: invalid URL/event/filter/update payload403: permission denied or feature gate denial404: webhook/link/delivery not found in workspace scope409: duplicate outbound webhook URL in workspace

