The analysis of the provided patch commit ad77666054651c1fd77b1dc60fd6a8db6600a29a reveals a vulnerability in the Telnyx webhook signature verification logic. The root cause of the vulnerability lies in the verifyTelnyxWebhook function within the file extensions/voice-call/src/webhook-security.ts. Previously, the function calculated a replayKey for detecting replay attacks using the raw signature string received in the HTTP request. However, the signature could be represented in different but equivalent Base64 encodings (standard Base64 and Base64URL). An attacker could exploit this by submitting the same valid webhook request multiple times, each time with a different encoding of the same signature. This would result in different replayKey values, allowing the duplicated requests to bypass the replay detection. The patch addresses this by introducing a canonicalization step. It now decodes the signature, regardless of its original Base64 variant, and then re-encodes it to a consistent, canonical Base64 representation before generating the replayKey. This ensures that any request with a cryptographically identical signature will produce the same replay key, effectively preventing the bypass. Therefore, the verifyTelnyxWebhook function is the direct location of the vulnerability.