Why use Timestamp Validator?
Replay attacks rely on stale timestamps. Compare webhook timestamps against a tolerance window to see whether a request is fresh enough for your risk model—especially for Stripe-style seconds-since-epoch headers.
Practical tips
- Align server clocks with NTP; skew is the most common false positive.
- Log both header time and receive time when disputing provider retries.
- Pair with Signature Validator so timestamp checks happen on authenticated payloads.
Common questions
- Which timestamp formats are supported?
- Use the presets in-tool for common providers; others may need manual epoch conversion.
- What tolerance should I use?
- Start with provider guidance—often a few minutes—and tighten only if traffic allows.