Skills api-commerce-stripe
Stripe payment processing — Checkout Sessions, Payment Intents, subscriptions, webhooks, Connect, customer management, error handling
git clone https://github.com/agents-inc/skills
T=$(mktemp -d) && git clone --depth=1 https://github.com/agents-inc/skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/src/skills/api-commerce-stripe" ~/.claude/skills/agents-inc-skills-api-commerce-stripe-f6584a && rm -rf "$T"
src/skills/api-commerce-stripe/SKILL.mdStripe Patterns
Quick Guide: Use the
npm package for all server-side Stripe operations. Always verify webhook signatures withstripeusing the raw request body, never the parsed body. Use idempotency keys on all mutating requests. Keep the secret key server-side only. Handle errors withconstructEvent(). Amounts are always in the smallest currency unit (e.g., cents for USD).instanceof Stripe.errors.StripeError
<critical_requirements>
CRITICAL: Before Using This Skill
All code must follow project conventions in CLAUDE.md (kebab-case, named exports, import ordering,
, named constants)import type
(You MUST NEVER expose
in client-side code — it stays on the server only)STRIPE_SECRET_KEY
(You MUST verify webhook signatures with
using the RAW request body — never parsed JSON)stripe.webhooks.constructEvent()
(You MUST use idempotency keys on all mutating (POST) requests to prevent duplicate charges)
(You MUST handle all Stripe errors with
— never swallow payment errors)instanceof Stripe.errors.StripeError
(You MUST express monetary amounts in the smallest currency unit — cents for USD, not dollars)
</critical_requirements>
Auto-detection: Stripe, stripe, stripe.checkout.sessions, stripe.paymentIntents, stripe.customers, stripe.subscriptions, stripe.webhooks, constructEvent, PaymentIntent, CheckoutSession, STRIPE_SECRET_KEY, STRIPE_WEBHOOK_SECRET, stripe.prices, stripe.products, stripe.refunds, stripe.transfers, stripe.accounts, Stripe.errors, idempotencyKey, payment_intent.succeeded, checkout.session.completed
When to use:
- Creating Checkout Sessions for one-time or subscription payments
- Building custom payment flows with Payment Intents
- Handling webhook events for asynchronous payment lifecycle
- Managing customers, payment methods, and subscriptions
- Building marketplace platforms with Stripe Connect
- Processing refunds and handling disputes
- Setting up products and prices for a catalog
Key patterns covered:
- Stripe client initialization with TypeScript types
- Checkout Sessions (one-time payments, subscriptions, setup mode)
- Payment Intents (custom flows, confirmation, capture)
- Webhook signature verification and event handling
- Customer creation, update, and payment method attachment
- Subscription lifecycle (create, update, cancel, trials, proration)
- Products and Prices (catalog management)
- Stripe Connect (account creation, transfers, destination charges)
- Error handling with typed Stripe errors
- Idempotency keys for safe retries
When NOT to use:
- Client-side Stripe.js or Stripe Elements (use your frontend framework skill)
- Stripe CLI commands or dashboard configuration
- Non-Stripe payment processors (use their dedicated skill)
Detailed Resources:
- For decision frameworks and anti-patterns, see reference.md
Core Setup & Payments:
- examples/core.md — Client setup, Checkout Sessions, Payment Intents, error handling
Webhooks & Events:
- examples/webhooks.md — Signature verification, event handling, idempotent processing
Subscriptions & Billing:
- examples/subscriptions.md — Subscription lifecycle, trials, proration, metered billing
Connect & Platforms:
- examples/connect.md — Connected accounts, transfers, destination charges, platform fees
<philosophy>
Philosophy
Stripe is a payment infrastructure platform. The
stripe npm package is the server-side SDK for interacting with the Stripe API. All payment processing happens server-side for security.
Core principles:
- Server-side only — The secret key and all payment-creating operations must never run in the browser. Client-side uses Stripe.js (a separate concern) only for collecting payment details.
- Amounts in smallest unit — All monetary values are integers in the smallest currency unit (cents for USD, pence for GBP).
means $10.00, not $1000.1000 - Idempotency for safety — Every mutating request should include an idempotency key to prevent duplicate charges on network retries. Stripe's SDK auto-generates keys for retries, but you should provide explicit keys for application-level retries.
- Webhooks are the source of truth — Payment status should be confirmed via webhooks, not by polling. Webhook events are the only reliable indicator that a payment succeeded, failed, or requires action.
- Error as typed exceptions — Stripe errors are thrown (not returned as values). Catch with
and handle by type for appropriate user responses.instanceof Stripe.errors.StripeError - API versioning matters — Pin your API version. Types reflect the latest API version. Use
in the constructor to lock behavior.apiVersion
When to use Stripe:
- Accepting payments (one-time, recurring, marketplace splits)
- Building subscription billing systems
- Platform/marketplace payment splitting with Connect
- Saving payment methods for future charges
When NOT to use:
- Client-side payment form rendering (Stripe.js / Elements is a separate domain)
- Payment processing without a server (Stripe requires server-side secret key)
- Simple donation buttons (Stripe Payment Links may suffice without code)
<patterns>
Core Patterns
Pattern 1: Stripe Client Initialization
Create a singleton Stripe client. Secret key from env, API version pinned. See examples/core.md for full setup.
export const stripe = new Stripe(process.env.STRIPE_SECRET_KEY!, { apiVersion: "2026-02-25.clover", });
Never hardcode the secret key or omit
apiVersion (behavior changes silently on Stripe API upgrades).
Pattern 2: Checkout Sessions
Use
mode: "payment" for one-time, mode: "subscription" for recurring. Stripe hosts the payment page. Always include {CHECKOUT_SESSION_ID} in the success URL (Stripe replaces this template automatically). See examples/core.md for full examples.
const session = await stripe.checkout.sessions.create({ mode: "payment", // or "subscription" or "setup" line_items: [{ price: priceId, quantity }], success_url: `${process.env.APP_URL}/success?session_id={CHECKOUT_SESSION_ID}`, cancel_url: `${process.env.APP_URL}/cancel`, });
Pattern 3: Payment Intents (Custom Flows)
Use Payment Intents when you need full control over the payment UI (e.g., Stripe Elements). Always use
automatic_payment_methods (not the legacy payment_method_types array) and include an idempotency key. See examples/core.md for full examples.
const paymentIntent = await stripe.paymentIntents.create( { amount: amountInCents, currency, automatic_payment_methods: { enabled: true }, }, { idempotencyKey: `pi_${orderId}` }, ); return { clientSecret: paymentIntent.client_secret };
Name parameters
amountInCents to avoid dollar/cent confusion. Return client_secret to the frontend.
Pattern 4: Customer Management
Create customers with idempotency keys (based on email to prevent duplicates). Attach payment methods in two steps: attach, then set as default via
invoice_settings.default_payment_method. See examples/core.md for full examples.
Pattern 5: Products and Prices
Products and prices are separate resources in Stripe's data model. Add
recurring: { interval } only for subscription prices. Name the amount parameter amountInCents. See examples/core.md for full examples.
Pattern 6: Refunds
Omit
amount for a full refund. Use payment_intent (preferred over charge). Always include an idempotency key unique to the refund amount. See examples/core.md for full examples.
Pattern 7: Error Handling
Catch errors with
instanceof Stripe.errors.StripeCardError (and other error subclasses). StripeCardError returns user-safe messages with decline_code. StripeInvalidRequestError is a developer bug. StripeConnectionError and StripeRateLimitError are retry-able. See examples/core.md for the complete error handling pattern.
</patterns>if (error instanceof Stripe.errors.StripeCardError) { return { success: false, message: error.message, code: error.code }; }
<red_flags>
RED FLAGS
High Priority Issues:
- Secret key in client-side code —
must never appear in browser bundles. UseSTRIPE_SECRET_KEY
(starts withSTRIPE_PUBLISHABLE_KEY
) for client-side Stripe.js only.pk_ - Webhook signature not verified — Without
verification, attackers can send fake events to fulfill orders, grant access, or modify records.constructEvent() - Raw body not used for webhooks — Using
(parsed JSON) instead of the raw body string/buffer causes signature verification to fail silently. With Express, usereq.body
on the webhook route.express.raw({ type: "application/json" }) - Missing idempotency keys — Without idempotency keys, network retries can create duplicate charges. Always pass
on create/update operations.{ idempotencyKey } - Dollar amounts instead of cents —
creates a $0.10 charge, not $10.00. Always multiply by 100 or name variablesamount: 10
.amountInCents
Medium Priority Issues:
- Not pinning API version — Without
in the constructor, Stripe uses your account's default version. API changes can silently break your integration.apiVersion - Using
instead ofpayment_method_types
— The legacy array approach requires manual updates as new payment methods become available.automatic_payment_methods
is the modern approach.automatic_payment_methods: { enabled: true } - Swallowing Stripe errors — Empty
blocks hide payment failures. Always log the error'scatch
for debugging with Stripe support.requestId - Not handling
status — Payment Intents may require 3D Secure authentication. Checkrequires_action
after confirmation.paymentIntent.status - Polling instead of webhooks — Checking payment status in a loop is unreliable and wastes API calls. Use webhooks for all asynchronous payment events.
Common Mistakes:
- Processing webhooks synchronously — Long-running operations in the webhook handler cause timeouts. Return
immediately, then process asynchronously.200 - Not handling duplicate webhook events — Stripe may deliver the same event multiple times. Track processed event IDs to ensure idempotent handling.
- Using test keys in production — Keys starting with
andsk_test_
only work with test data. Verify your environment configuration.pk_test_ - Forgetting
for nested objects — Stripe returns IDs by default for related objects. Useexpand
to get full objects.expand: ["latest_invoice.payment_intent"]
Gotchas & Edge Cases:
- Stripe events are not ordered —
may arrive beforeinvoice.paid
. Design handlers to be order-independent.invoice.created - Checkout Session
is a literal template — Stripe replaces this placeholder in the{CHECKOUT_SESSION_ID}
. Do not URL-encode it.success_url - Subscription proration is on by default — Upgrading a plan mid-cycle prorates automatically. Pass
to disable.proration_behavior: "none" - Idempotency keys expire after 24 hours — After expiry, the same key creates a new request. For long-lived retries, generate a new key.
- Zero-decimal currencies — JPY, KRW, and others have no decimal subunit.
in JPY means 500 yen, not 5 yen. Checkamount: 500
.Stripe.ZERO_DECIMAL_CURRENCIES - Connect transfers require
capability — Connected accounts must havetransfers
andcard_payments
capabilities enabled before receiving transfers.transfers - Webhook secrets differ per endpoint — Each webhook endpoint has its own signing secret. Using the wrong secret causes all signature verifications to fail.
</red_flags>
<critical_reminders>
CRITICAL REMINDERS
All code must follow project conventions in CLAUDE.md (kebab-case, named exports, import ordering,
, named constants)import type
(You MUST NEVER expose
in client-side code — it stays on the server only)STRIPE_SECRET_KEY
(You MUST verify webhook signatures with
using the RAW request body — never parsed JSON)stripe.webhooks.constructEvent()
(You MUST use idempotency keys on all mutating (POST) requests to prevent duplicate charges)
(You MUST handle all Stripe errors with
— never swallow payment errors)instanceof Stripe.errors.StripeError
(You MUST express monetary amounts in the smallest currency unit — cents for USD, not dollars)
Failure to follow these rules will create security vulnerabilities, duplicate charges, and silent payment failures.
</critical_reminders>