Auth events and Svix signatures
Inspect `svix-id`, `svix-timestamp`, and `svix-signature`, then verify your app uses the raw request body before signature verification.
Webhooks
Webhook debugging is one of the strongest reasons to use Binboi. The relay gives providers a stable public target during local development, and the dashboard plus logs help explain whether the failure happened in delivery, signature handling, routing, or your application itself.
Model
Webhook providers do not care that your app is local. They only care that they can reach a public URL and that your service responds correctly.
Binboi solves the public-reachability problem by giving your local handler a stable external URL.
Once delivery is no longer blocked by localhost, the next job is to figure out whether the request reached the correct route and whether your app handled it correctly.
That is where request metadata, relay logs, and webhook-specific debugging patterns become useful.
bash
binboi start 3000 webhook-dev
# Example endpoint configured in a provider
https://webhook-dev.binboi.link/api/webhooks/stripeExamples
Different providers use different signatures and payload shapes, but the debugging questions are usually the same.
Inspect `svix-id`, `svix-timestamp`, and `svix-signature`, then verify your app uses the raw request body before signature verification.
Use a local Binboi URL for project callbacks and compare the incoming JSON payload with the exact provisioning logic your app expected.
Confirm the target route, review provider headers, and check whether framework middleware rewrote or rejected the request before your handler ran.
A stable tunnel plus request visibility makes it easier to diagnose `checkout.session.completed`, `invoice.paid`, and signature failures without deploying a preview app.
Delivery IDs, event names, and retry timing matter. Binboi helps you prove that the callback reached the intended local route.
Use the tunnel like any other webhook endpoint today, then layer provider-specific debugging guidance on top as the integration surface matures.
bash
binboi start 3000 stripe-events
# Configure Stripe to send events to:
https://stripe-events.binboi.link/webhooks/stripe
# Local checks
binboi whoami
grep STRIPE_WEBHOOK_SECRET .envPractice
The provider changes, but the operator workflow stays consistent.
First prove the tunnel is online and authenticated.
Then verify the provider is sending to the expected path and host.
Next inspect signature headers, raw-body handling, and any middleware that could interfere before the handler sees the request.
Only after that should you dive into provider-specific payload semantics or application business logic.
Product direction
Provider integrations are about shortening time-to-debug, not just adding logos to the dashboard.
A strong integration should include provider-aware setup instructions.
It should show the relevant signature headers, common route shapes, and example payload expectations.
Where the repository still provides generic tunnel behavior instead of one-click provider flows, the docs say so clearly and label the richer experience as MVP or planned.