Webhook triggers enable ambient agents to respond to events from applications in real time. External systems (the provider) send an HTTP request to the Listener (the receiver). The Listener validates and parses the request into an event, which activates one or more plugins to execute processes.
“Who is this for?
Builders creating always-active automations triggered by system events, such as “New GitHub issue opened,” “Offer letter signed,” or “Gong call ended.” For the full landscape, see System Triggers Overview.”
Dive into example webhook configurations for Github & Zoom.
listener.webhook.trigger.listener.webhook.processor.update.listener.webhook.plugin.trigger.compound_action.* and action logs.Authentication & security
Why secure? Without auth/signature, anyone who knows your URL can attempt to trigger your workflow. Unsecured listeners are heavily rate-limited (e.g., 1 req / 10s) vs. significantly higher limits for secured listeners.
Event filtering
issues.opened, ignore issues.edited).Deduplication & replay protection
One-time verification challenges
Trace any event end-to-end with three new log types:
listener.webhook.trigger: Confirms the raw request reached your Listener, including headers, method, parsed body, and timestamps.listener.webhook.processor.update: Displays the processing outcome (published, failed with reason, or debounced) and the normalized payload.listener.webhook.plugin.trigger: Indicates which plugins were evaluated, activated, skipped, failed, or expired (TTL).See the Webhook Logs & Troubleshooting guide for playbooks on diagnosing issues such as “Why didn’t my plugin run?”