policy name: organization_webhook_doesnt_require_ssl
severity: LOW
Webhooks that are not configured with SSL enabled could expose your sofware to man in the middle attacks (MITM).
If SSL verification is disabled, any party with access to the target DNS domain can masquerade as your designated payload URL, allowing it freely read and affect the response of any webhook request. In the case of GitLab Self-Managed, it may be sufficient only to control the DNS configuration of the network where the instance is deployed.