You can set up webhooks for common events and actions from the moderation queue. This is useful if you want to integrate the queue with your own systems. Webhooks are configured under actions in your dashboard The webhook payload will be sent as a POST request to the URL you specify. The webhooks require your server to respond with a 200 status code within 5 seconds, otherwise they will be retried. Webhooks are tried at most 5 times.
You can verify that the webhook is coming from us by comparing the signature of the payload with the signature provided in the modapi-signature header. The signature is a HMAC SHA256 hash of the payload using your webhook secret as the key. Find you webhook secret under API Keys in your dashboard.
If webhooks aren’t working as expected, first check the events log in your dashboard to see detailed information about webhook delivery attempts and any failures.
You may find that some hosting providers and security services block webhook traffic. For example Cloudflare’s Bot Fight mode will present a challenge instead of allowing the webhook.
Action: Skip All Super Bot Fight Mode Rules and other rules that might interfere.
Make sure to place this rule before other rules
Deploy the rule
❌ Security Rules won’t workBot Fight Mode cannot be bypassed using Skip actions in WAF custom rules or Page Rules. Skip, Bypass, and Allow actions only apply to Ruleset Engine rules.✅ Solutions:
Option 1: Upgrade to a Pro plan to use Super Bot Fight Mode (which can be bypassed)
Option 2: Create a rule to allow Moderation API’s IP address - see Cloudflare’s guide here, and reach out to support at [email protected] to get the IP address that is used for your Moderation API account
Common providers with security blocking:
SiteDistrict
DigitalOcean App Platform
Vercel
Netlify
AWS CloudFront
Azure Front Door
General configuration steps:
Access your provider’s security/firewall settings
Look for “allow rules”, “exceptions”, or “bypass rules”
Add a User-Agent rule for ModAPI/ (preferred)
Or contact support to get IP addresses allowlisted for your account
Save and deploy the configuration
Where to find settings:
Vercel: Project settings → Security
Netlify: Site settings → Build & deploy → Post processing
DigitalOcean: App settings → Security section
AWS CloudFront: WAF & Shield → Web ACLs
Azure Front Door: Rules engine or WAF policies
Each provider uses different terminology. Look for “firewall rules”, “security exceptions”, or “allow rules” in your provider’s documentation.