
Resend fires webhooks for every event in an email's lifecycle: dispatched, delivered (or delayed), opened, clicked, bounced, complained. They're how your application stays in sync with what's actually happening to messages after they leave your code.
This guide covers what Resend sends, how to verify it (Standard Webhooks-compatible), and what production reliability requires.
What Resend sends
Resend webhooks are JSON POST requests. An email.delivered event:
{
"type": "email.delivered",
"created_at": "2026-04-25T14:30:00.000Z",
"data": {
"email_id": "4ef9a417-9fb0-4c72-bdf6-c45e6e4d5b1c",
"from": "you@your-app.com",
"to": ["customer@example.com"],
"subject": "Your weekly summary",
"created_at": "2026-04-25T14:29:50.000Z"
}
}
Headers (Standard Webhooks spec):
svix-id: msg_2NxV5y...
svix-timestamp: 1714000000
svix-signature: v1,abc123...
content-type: application/json
Common Resend event types:
email.sent— the message was accepted by Resendemail.delivered— the recipient mail server accepted the messageemail.delivery_delayed— temporary deferral (greylisting, soft bounce)email.bounced— hard bounce (invalid address, mailbox full)email.complained— recipient marked as spamemail.opened— recipient opened the message (tracking-pixel based)email.clicked— recipient clicked a link
The data.email_id is the Resend ID for the message — use it to correlate webhooks back to the send.
Resend's signature scheme (Standard Webhooks)
Resend follows the Standard Webhooks spec (the same scheme used by Clerk and several other providers). The signature is HMAC-SHA256 of {svix-id}.{svix-timestamp}.{raw-body}, base64-encoded, prefixed with v1,:
signature = "v1," + base64(hmac_sha256(secret, svix_id + "." + svix_timestamp + "." + raw_body))
Verification:
- Read the raw body before any JSON parsing
- Reject if
now - svix_timestamp > 300seconds (replay protection) - Recompute the signature; the header may contain multiple space-separated values during secret rotation — accept any match
- Compare constant-time
The official svix library does this for you in every supported language.
Resend's retry policy
Resend uses Standard Webhooks-style delivery. Failed deliveries are retried by the provider and are visible in Resend's webhook tooling, but you should still design your own recovery path for accepted events that fail downstream.
This means:
- Acknowledge fast — return 2xx in under one second
- Be idempotent on
svix-id— duplicates will arrive during retries - Have a recovery story — past Resend's window, manual replay from the dashboard is the only built-in fallback
DIY: minimal Resend webhook handler in Node
import { Webhook } from 'svix'
const secret = process.env.RESEND_WEBHOOK_SECRET!
export async function POST(req: Request) {
const headers = {
'svix-id': req.headers.get('svix-id')!,
'svix-timestamp': req.headers.get('svix-timestamp')!,
'svix-signature': req.headers.get('svix-signature')!,
}
const body = await req.text()
let event
try {
event = new Webhook(secret).verify(body, headers)
} catch {
return new Response('Bad signature', { status: 400 })
}
// Idempotency on svix-id
// ...
queueWork(event)
return new Response('ok', { status: 200 })
}
Production needs more:
- A persistence layer for
svix-ididempotency - A queue for async work
- Replay path for events past Resend's retry window
- Filtering — high-volume senders see large amounts of
email.openedandemail.clickedevents - Routing — bounces and complaints to a suppression-list updater, opens and clicks to your analytics stack
Hooksbase: receive Resend webhooks without rebuilding the rest
Hooksbase treats Resend as one of five pre-verified providers. After the request passes Hooksbase ingest auth, the Standard Webhooks signature is verified at the relay edge before the payload reaches your endpoint.
Setup:
- Create a webhook in Hooksbase with
provider: resend - Paste your Resend webhook signing secret (encrypted at rest)
- Put a small forwarder at the Resend webhook URL. It should preserve the raw body and Svix headers, then POST to the Hooksbase ingest URL with
Authorization: Bearer <ingest secret>. If your source is already a custom producer that can attach that header, it can call Hooksbase directly. - Add your application URL as the destination
You get:
- Signature verification before the event reaches your code
- Idempotency for your destination — every dispatch includes a unique
webhook-idheader you can dedupe on across retries. Resend'ssvix-idis captured asprovider.sourceIdand queryable on every delivery. - Retries with exponential backoff to your endpoint after Hooksbase accepts the event
- Routing rules by event type — send
email.bouncedto a suppression-list updater,email.complainedto your abuse-handling flow,email.opened/email.clickedto analytics - Payload transforms — extract just the fields your downstream needs from Resend's nested structure
- Provider-aware queryable fields —
provider.eventType(the Resend event),provider.verifiedon every delivery - Deterministic replay — re-run an event with the same payload bytes after a fix while the payload is retained
- Delivery history and DLQ
- Event drains (Pro+) — stream Resend lifecycle events directly to Axiom, Datadog, object storage, OTLP HTTP, or your own HTTP sink alongside the rest of your agent telemetry
Common Resend webhook use cases for AI agents
- Suppression-list agent —
email.bouncedandemail.complainedevents trigger an agent that auto-removes the address from active campaigns and flags it in your CRM - Re-engagement agent —
email.openedafter a long quiet period triggers an agent that drafts and schedules a personalized follow-up - Click-driven workflow agent —
email.clickedon a specific CTA triggers an agent that advances the recipient to the next stage of a sequence - Deliverability monitoring agent — patterns of
email.delivery_delayedandemail.bouncedtrigger an agent that diagnoses sender-reputation issues and pages on-call - Receipt confirmation agent —
email.deliveredon a transactional confirmation triggers a downstream system to mark the order as "notified"
Where to go next
- How to receive Clerk webhooks reliably for the same Standard Webhooks pattern
- How to receive Stripe webhooks reliably
- Verify provider webhooks for the verification model
- Stream agent event lifecycle to your observability stack for the event-drain side
Start free at app.hooksbase.com, then use Starter+ provider verification when you're ready to receive signed Resend webhooks through Hooksbase.