Rate this page:

Secure your Sinatra app by validating incoming Twilio requests

In this guide we will cover how to secure your Sinatra application by validating that incoming requests to your Twilio webhooks are, in fact, from Twilio.

With a few lines of code we will write a custom validation for our Sinatra app that uses the Twilio Ruby SDK validator utility. We can then use that validator on our Sinatra app which accept Twilio webhooks to confirm that incoming requests genuinely originated from Twilio.

Let’s get started!

A starting point

If you need help with the setup of a development environment for ruby check the setup documentation.

We will start building from a basic code example implementing a Sinatra application.

Running the example code like:

$ ruby index.rb

This application returns TwiML to any request to "/" without any validation whatsoever:

$ curl -XPOST http://localhost:4567
<?xml version="1.0" encoding="UTF-8"?> <Response><Message>Hello World</Message></Response>
Loading Code Sample...
        A simple Sinatra application responding TwiML.

        A Sinatra app without Twilio request validation

        A simple Sinatra application responding TwiML.

        Adding request validation

        To add request validation to your Sinatra App, you'll need an Authentication Token.

        We will need an Authentication Token for the Twilio API from the Twilio Console, and this token will be set by exporting a new environment variable:


        To enable request validation through the Rack middleware, we have to add the following line:

        use Rack::TwilioWebhookAuthentication, ENV['TWILIO_AUTH_TOKEN'], '/'
        Loading Code Sample...
              Confirm incoming requests to your Sinatra app are genuine with this validation.

              Use Twilio webhook middleware for Sinatra app that validates Twilio requests

              Confirm incoming requests to your Sinatra app are genuine with this validation.

              Overview and testing

              At this point the example has grown and has enabled secure authentication of Twilio requests using your Authentication Token.

              We can test that request validation is working by repeating the previous curl step:

              $ curl -XPOST http://localhost:4567
              Twilio Request Validation Failed.

              Confirm that incoming requests to your Sinatra application are genuine with this custom validation logic. It will return <?xml version="1.0" encoding="UTF-8"?> <Response><Message>Hello World</Message></Response> if the request is valid, or Twilio Request Validation Failed. if it is not. Our logic then either continues processing the request or returns error 403 HTTP response for invalid requests attempt.

              Validation during testing

              If you write tests for your Sinatra application, those tests may fail for routes where you use Twilio request validation. To fix this problem we recommend to use a mocking library in your tests. Take a look at the official Rack documentation for mocking requests and mocking responses.

              What’s next?

              Validating requests to your Twilio webhooks is a great first step for securing your Twilio application. We recommend reading over our full security documentation for more advice on protecting your app, and the Anti-Fraud Developer’s Guide in particular.

              To learn more about securing your Sinatra application in general, check out the security considerations page in the official Sinatra documentation, or you can also take a look at the official Rack documentation and the Twilio Ruby SDK.

              Juan Carlos Ojeda Kevin Whinnery Kat King Andrew Baker Paul Kamp Shawn Stern
              Rate this page:

              Need some help?

              We all do sometimes; code is hard. Get help now from our support team, or lean on the wisdom of the crowd by visiting Twilio's Stack Overflow Collective or browsing the Twilio tag on Stack Overflow.

              Loading Code Sample...

                    Thank you for your feedback!

                    Please select the reason(s) for your feedback. The additional information you provide helps us improve our documentation:

                    Sending your feedback...
                    🎉 Thank you for your feedback!
                    Something went wrong. Please try again.

                    Thanks for your feedback!