Skip to content Skip to footer

Webhook trigger

About Webhook trigger

CORE NODE
|
LIVE
Every workflow needs at least one trigger. Webhook trigger is the most versatile form to start your workflow from anywhere on the internet!

It comes with multiple levels of security depending on your need

- None: Quick and easy setup with an open access; perfect for the public-facing utilities.
- Basic Auth: A basic way to keep your things private with a user defined username and password.
- JWT Token: Enterprise grade security best suited for enterprises.

This means you can start your workflow exactly when you need to, using any app you like, and stay safe at the same time!
Free 10k credits/mo
Webhook trigger node
Verified
This node is build and supported by Decimal

Settings

This node is highly versatile and powerful. It can monitor and respond to specific Web2 events, or be triggered by other workflows; giving you flexible control over when and how your automations run.
Security
Choose your desired security level from any of the following options

1. None
2. Basic Auth
3. JWT Bearer Token
Create Webhook Link
Clicking the button generates a unique Webhook URL specific to that node instance.

You can regenerate a new URL at any time if you believe the current one may have been exposed or compromised.
Trigger
Copy-paste the given Webhook link into any tool, browser, or service that supports sending web requests (like Zapier, Make, Postman, or even a browser address bar).

Each time it's called, your workflow will run automatically.

FAQ about Webhook trigger

1. Where can I use Webhook trigger?
Webhooks let you monitor and respond to any Web2 event. You can use them to trigger an autonomous Web3 workflow from any external tool or service.

They also enable a modular, reusable architecture—where one workflow can trigger another workflow.

Over time, this becomes a foundational layer for turning deterministic workflows into reusable tools or “skills” that can even be called by any AI agents.
Webhooks open your workflows to the entire Web2 ecosystem—but with that flexibility comes its own risks.

You can design the security model that fits your needs. Create a public workflow that anyone can trigger, or restrict access so only trusted sources can activate it using Basic Auth or JWT tokens for enterprise-grade protection.
Nonce is an added layer of protection embedded in the URL to prevent accidental duplicate trigger or any DDOS attacks.

It gets reset every 2 secs. So any duplicate attempt made within 2 secs will be auto-declined.

Build your first Web3 workflow.

10,000 FREE credits/mo

Realise Web3 true potential

SIGNUP FOR UPDATES*

    INQUIRIES
    SOCIALS

    Decimal© 2023-2026. All Rights Reserved.

    These materials are for general information purposes only and are not investment advice or a recommendation or solicitation to buy, sell, stake or hold any cryptoasset or to engage in any specific trading strategy. Decimal does not and will not work to increase or decrease the price of any particular cryptoasset it makes available. Some crypto products and markets are unregulated, and you may not be protected by government compensation and/or regulatory protection schemes. The unpredictable nature of the crypto-asset markets can lead to loss of funds. Tax may be payable on any return and/or on any increase in the value of your cryptoassets and you should seek independent advice on your taxation position. Geographic restrictions may apply.

    Go to Top