Browser-only
Generation and export both stay in the browser.
Generate secure random webhook secrets for HMAC verification, API callbacks, and service-to-service authentication.
Create private secrets for webhook signature verification, callback authentication, and internal service validation.
The recommended default for production systems.
Readable and easy to store in environment variables.
A practical default for most webhook integrations.
Secret
Secure random generation is not available in this browser..env format
WEBHOOK_SECRET=Always verify the signature using the raw request body before parsing JSON.
| Item | Webhook Secret | API Key |
|---|---|---|
| Main purpose | Verify incoming webhook payloads | Authenticate API requests |
| Direction | Sender to receiver | Client to API |
| Common usage | HMAC signature verification | API access control |
| Should it be public? | No | No |
| Where to store it? | Environment variables or secret manager | Environment variables or secret manager |
A webhook secret is a private random value used to verify that a webhook request came from a trusted sender. It is usually used with HMAC signatures.
Yes. The tool uses the browser Web Crypto API to generate cryptographically secure random bytes.
No. The secret is generated locally in the browser and is never sent to a server by this tool.
Use at least 32 random bytes for production. The default in this tool is 48 bytes.
Hex is easy to read and store in environment variables. Base64url is shorter and URL-safe. Hex is the default here for simplicity.
No. Store webhook secrets in environment variables, deployment platform secrets, or a secret manager.
No. An API key is usually used by a client to access an API. A webhook secret is usually used by a receiver to verify that an incoming webhook request is authentic.
Open the full generators page to compare tools and switch to another one.
Generation and export both stay in the browser.
Your input is never sent to a server.
Reloading clears the input and output.