Hookaido Webhook Integration

ReviewAudited by ClawScan on May 1, 2026.

Overview

This is a coherent Hookaido operations skill, but it legitimately needs webhook secrets and can run or mutate webhook queues, so users should install it only for intended Hookaido administration.

Install this skill if you want an agent to help operate Hookaido. Before using it in production, confirm which Hookaidofile, database, token, and environment it will access; keep MCP read-only unless mutations are needed; and require explicit approval for DLQ deletes, queue acknowledgements, runtime control, or exec-based webhook handlers.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone or any agent using these credentials could authenticate to Hookaido pull or ingress flows within the configured environment.

Why it was flagged

The skill requires a pull API token and ingress secret, which are sensitive credentials. This is expected for authenticated webhook receiving and consumption.

Skill content
requires:
      bins:
        - hookaido
      env:
        - HOOKAIDO_PULL_TOKEN
        - HOOKAIDO_INGRESS_SECRET
Recommendation

Use least-privilege tokens where possible, keep them out of logs and shared prompts, and rotate them if exposed.

What this means

Incorrect use could acknowledge, requeue, or delete webhook events and change downstream processing behavior.

Why it was flagged

The documentation includes Admin API mutations that can requeue or delete dead-letter queue items. This is aligned with Hookaido operations but can permanently affect webhook processing state.

Skill content
# Delete DLQ items
curl -sS -X POST "http://127.0.0.1:2019/dlq/delete" ... -d '{"ids":["evt_3"]}'
Recommendation

Review backlog and DLQ entries before mutation, use explicit IDs, include audit reasons, and require human confirmation for deletes or production queue changes.

What this means

If configured carelessly, incoming webhooks could trigger local scripts or deployment actions.

Why it was flagged

Hookaido supports subprocess webhook handlers, meaning webhook delivery can execute a local script. The skill presents this as an explicit optional module, not hidden behavior.

Skill content
deliver exec "/opt/hooks/deploy.sh" {
    timeout 30s
    retry exponential max 3 base 1s cap 30s jitter 0.2
    env DEPLOY_ENV production
  }
Recommendation

Only use exec delivery with trusted scripts, strict webhook signature verification, timeouts, and non-privileged execution accounts.

What this means

Installing the skill places a third-party Hookaido binary on the machine.

Why it was flagged

The installer downloads an external release binary, but the script pins the default version and verifies the downloaded artifact against embedded SHA256 values.

Skill content
url="https://github.com/${repo}/releases/download/${tag}/${artifact}"
...
curl --proto '=https' --tlsv1.2 -fL "$url" -o "$archive"
...
if [[ "$actual_sha" != "$expected_sha" ]]; then
Recommendation

Prefer the pinned installer or pinned Go install path, and avoid overriding the version unless you also provide and verify the expected checksum.

What this means

A globally registered or mutation-enabled MCP server could let an agent inspect or change Hookaido queue state from more contexts than intended.

Why it was flagged

The skill documents MCP server modes, including mutation-enabled operation and optional global registration. This is disclosed and role-based, but it can expose Hookaido operations to agent tooling beyond one local task.

Skill content
hookaido mcp serve --config ./Hookaidofile --db ./.data/hookaido.db \
  --enable-mutations --role operate --principal ops@example.test
...
Use `~/.claude/settings.json` for global registration across all projects.
Recommendation

Use read-only MCP mode by default, prefer project-local registration, and enable operate/admin roles only for trusted workflows.