Webhooks
Receive events from external services (GitHub, GitLab, JIRA, Stripe, etc.) and trigger Hermes agent runs automatically. The webhook adapter runs an HTTP server that accepts POST requests, validates HMAC signatures, transforms payloads into agent prompts, and routes responses back to the source or to another configured platform.
The agent processes the event and can respond by posting comments on PRs, sending messages to Telegram/Discord, or logging the result.
Quick Start
- Enable via
hermes gateway setupor environment variables - Define routes in
config.yamlor create them dynamically withhermes webhook subscribe - Point your service at
http://your-server:8644/webhooks/<route-name>
Setup
There are two ways to enable the webhook adapter.
Via setup wizard
hermes gateway setup
Follow the prompts to enable webhooks, set the port, and set a global HMAC secret.
Via environment variables
Add to ~/.hermes/.env:
WEBHOOK_ENABLED=true
WEBHOOK_PORT=8644 # default
WEBHOOK_SECRET=your-global-secret
Verify the server
Once the gateway is running:
curl http://localhost:8644/health
Expected response:
{"status": "ok", "platform": "webhook"}
Configuring Routes
Routes define how different webhook sources are handled. Each route is a named entry under platforms.webhook.extra.routes in your config.yaml.
Route properties
| Property | Required | Description |
|---|---|---|
events | No | List of event types to accept (e.g. ["pull_request"]). If empty, all events are accepted. Event type is read from X-GitHub-Event, X-GitLab-Event, or event_type in the payload. |
secret | Yes | HMAC secret for signature validation. Falls back to the global secret if not set on the route. Set to "INSECURE_NO_AUTH" for testing only (skips validation). |
prompt | No | Template string with dot-notation payload access (e.g. {pull_request.title}). If omitted, the full JSON payload is dumped into the prompt. |
skills | No | List of skill names to load for the agent run. |
deliver | No | Where to send the response: github_comment, telegram, discord, slack, signal, sms, or log (default). |
deliver_extra | No | Additional delivery config — keys depend on deliver type (e.g. repo, pr_number, chat_id). Values support the same {dot.notation} templates as prompt. |
Full example
platforms:
webhook:
enabled: true
extra:
port: 8644
secret: "global-fallback-secret"
routes:
github-pr:
events: ["pull_request"]
secret: "github-webhook-secret"
prompt: |
Review this pull request:
Repository: {repository.full_name}
PR #{number}: {pull_request.title}
Author: {pull_request.user.login}
URL: {pull_request.html_url}
Diff URL: {pull_request.diff_url}
Action: {action}
skills: ["github-code-review"]
deliver: "github_comment"
deliver_extra:
repo: "{repository.full_name}"
pr_number: "{number}"
deploy-notify:
events: ["push"]
secret: "deploy-secret"
prompt: "New push to {repository.full_name} branch {ref}: {head_commit.message}"
deliver: "telegram"
Prompt Templates
Prompts use dot-notation to access nested fields in the webhook payload:
{pull_request.title}resolves topayload["pull_request"]["title"]{repository.full_name}resolves topayload["repository"]["full_name"]- Missing keys are left as the literal
{key}string (no error) - Nested dicts and lists are JSON-serialized and truncated at 2000 characters
If no prompt template is configured for a route, the entire payload is dumped as indented JSON (truncated at 4000 characters).
The same dot-notation templates work in deliver_extra values.
GitHub PR Review (Step by Step)
This walkthrough sets up automatic code review on every pull request.
1. Create the webhook in GitHub
- Go to your repository → Settings → Webhooks → Add webhook
- Set Payload URL to
http://your-server:8644/webhooks/github-pr - Set Content type to
application/json - Set Secret to match your route config (e.g.
github-webhook-secret) - Under Which events?, select Let me select individual events and check Pull requests
- Click Add webhook
2. Add the route config
Add the github-pr route to your ~/.hermes/config.yaml as shown in the example above.
3. Ensure gh CLI is authenticated
The github_comment delivery type uses the GitHub CLI to post comments:
gh auth login
4. Test it
Open a pull request on the repository. The webhook fires, Hermes processes the event, and posts a review comment on the PR.
GitLab Webhook Setup
GitLab webhooks work similarly but use a different authentication mechanism. GitLab sends the secret as a plain X-Gitlab-Token header (exact string match, not HMAC).
1. Create the webhook in GitLab
- Go to your project → Settings → Webhooks
- Set the URL to
http://your-server:8644/webhooks/gitlab-mr - Enter your Secret token
- Select Merge request events (and any other events you want)
- Click Add webhook
2. Add the route config
platforms:
webhook:
enabled: true
extra:
routes:
gitlab-mr:
events: ["merge_request"]
secret: "your-gitlab-secret-token"
prompt: |
Review this merge request:
Project: {project.path_with_namespace}
MR !{object_attributes.iid}: {object_attributes.title}
Author: {object_attributes.last_commit.author.name}
URL: {object_attributes.url}
Action: {object_attributes.action}
deliver: "log"
Delivery Options
The deliver field controls where the agent's response goes after processing the webhook event.
| Deliver Type | Description |
|---|---|
log | Logs the response to the gateway log output. This is the default and is useful for testing. |
github_comment | Posts the response as a PR/issue comment via the gh CLI. Requires deliver_extra.repo and deliver_extra.pr_number. The gh CLI must be installed and authenticated on the gateway host (gh auth login). |
telegram | Routes the response to Telegram. Uses the home channel, or specify chat_id in deliver_extra. |
discord | Routes the response to Discord. Uses the home channel, or specify chat_id in deliver_extra. |
slack | Routes the response to Slack. Uses the home channel, or specify chat_id in deliver_extra. |
signal | Routes the response to Signal. Uses the home channel, or specify chat_id in deliver_extra. |
sms | Routes the response to SMS via Twilio. Uses the home channel, or specify chat_id in deliver_extra. |
For cross-platform delivery (telegram, discord, slack, signal, sms), the target platform must also be enabled and connected in the gateway. If no chat_id is provided in deliver_extra, the response is sent to that platform's configured home channel.
Dynamic Subscriptions (CLI)
In addition to static routes in config.yaml, you can create webhook subscriptions dynamically using the hermes webhook CLI command. This is especially useful when the agent itself needs to set up event-driven triggers.
Create a subscription
hermes webhook subscribe github-issues \
--events "issues" \
--prompt "New issue #{issue.number}: {issue.title}\nBy: {issue.user.login}\n\n{issue.body}" \
--deliver telegram \
--deliver-chat-id "-100123456789" \
--description "Triage new GitHub issues"
This returns the webhook URL and an auto-generated HMAC secret. Configure your service to POST to that URL.
List subscriptions
hermes webhook list
Remove a subscription
hermes webhook remove github-issues
Test a subscription
hermes webhook test github-issues
hermes webhook test github-issues --payload '{"issue": {"number": 42, "title": "Test"}}'
How dynamic subscriptions work
- Subscriptions are stored in
~/.hermes/webhook_subscriptions.json - The webhook adapter hot-reloads this file on each incoming request (mtime-gated, negligible overhead)
- Static routes from
config.yamlalways take precedence over dynamic ones with the same name - Dynamic subscriptions use the same route format and capabilities as static routes (events, prompt templates, skills, delivery)
- No gateway restart required — subscribe and it's immediately live
Agent-driven subscriptions
The agent can create subscriptions via the terminal tool when guided by the webhook-subscriptions skill. Ask the agent to "set up a webhook for GitHub issues" and it will run the appropriate hermes webhook subscribe command.
Security
The webhook adapter includes multiple layers of security:
HMAC signature validation
The adapter validates incoming webhook signatures using the appropriate method for each source:
- GitHub:
X-Hub-Signature-256header — HMAC-SHA256 hex digest prefixed withsha256= - GitLab:
X-Gitlab-Tokenheader — plain secret string match - Generic:
X-Webhook-Signatureheader — raw HMAC-SHA256 hex digest
If a secret is configured but no recognized signature header is present, the request is rejected.
Secret is required
Every route must have a secret — either set directly on the route or inherited from the global secret. Routes without a secret cause the adapter to fail at startup with an error. For development/testing only, you can set the secret to "INSECURE_NO_AUTH" to skip validation entirely.
Rate limiting
Each route is rate-limited to 30 requests per minute by default (fixed-window). Configure this globally:
platforms:
webhook:
extra:
rate_limit: 60 # requests per minute
Requests exceeding the limit receive a 429 Too Many Requests response.
Idempotency
Delivery IDs (from X-GitHub-Delivery, X-Request-ID, or a timestamp fallback) are cached for 1 hour. Duplicate deliveries (e.g. webhook retries) are silently skipped with a 200 response, preventing duplicate agent runs.
Body size limits
Payloads exceeding 1 MB are rejected before the body is read. Configure this:
platforms:
webhook:
extra:
max_body_bytes: 2097152 # 2 MB
Prompt injection risk
Webhook payloads contain attacker-controlled data — PR titles, commit messages, issue descriptions, etc. can all contain malicious instructions. Run the gateway in a sandboxed environment (Docker, VM) when exposed to the internet. Consider using the Docker or SSH terminal backend for isolation.
Troubleshooting
Webhook not arriving
- Verify the port is exposed and accessible from the webhook source
- Check firewall rules — port
8644(or your configured port) must be open - Verify the URL path matches:
http://your-server:8644/webhooks/<route-name> - Use the
/healthendpoint to confirm the server is running
Signature validation failing
- Ensure the secret in your route config exactly matches the secret configured in the webhook source
- For GitHub, the secret is HMAC-based — check
X-Hub-Signature-256 - For GitLab, the secret is a plain token match — check
X-Gitlab-Token - Check gateway logs for
Invalid signaturewarnings
Event being ignored
- Check that the event type is in your route's
eventslist - GitHub events use values like
pull_request,push,issues(theX-GitHub-Eventheader value) - GitLab events use values like
merge_request,push(theX-GitLab-Eventheader value) - If
eventsis empty or not set, all events are accepted
Agent not responding
- Run the gateway in foreground to see logs:
hermes gateway run - Check that the prompt template is rendering correctly
- Verify the delivery target is configured and connected
Duplicate responses
- The idempotency cache should prevent this — check that the webhook source is sending a delivery ID header (
X-GitHub-DeliveryorX-Request-ID) - Delivery IDs are cached for 1 hour
gh CLI errors (GitHub comment delivery)
- Run
gh auth loginon the gateway host - Ensure the authenticated GitHub user has write access to the repository
- Check that
ghis installed and on the PATH
Environment Variables
| Variable | Description | Default |
|---|---|---|
WEBHOOK_ENABLED | Enable the webhook platform adapter | false |
WEBHOOK_PORT | HTTP server port for receiving webhooks | 8644 |
WEBHOOK_SECRET | Global HMAC secret (used as fallback when routes don't specify their own) | (none) |