BLACKOUT://BTI_DATABASE

BTI THREAT DATABASE

Browser Trust Index classifications for MarTech surveillance vendors

7
TOTAL ENTRIES
3
CRITICAL
1
ACTIVE
1
DRAFT
Showing 7 of 7 entries
9.5BTSS
BTI-2025-0025PUBLISHEDPRE_CONSENT

TrenDemon

TrenDemon is an ABM (Account-Based Marketing) content personalization platform. Critical findings include: (1) 6 eval() functions executing arbitrary JavaScript from CTA parameters enabling customer-level RCE, (2) polyfill.io supply chain vulnerability loading from COMPROMISED domain (June 2024), (3) 760-day cookie retention violating GDPR/ICO guidelines, (4) Cross-vendor Marketo cookie harvesting, (5) Base64 URL obfuscation to evade privacy tools.

#eval-vulnerability#arbitrary-code-execution#cross-vendor-cookie-harvesting#extreme-cookie-lifetime#base64-obfuscation#marketo-integration
CRITICAL
9.2BTSS
BTI-2025-0001ACTIVEDEFEAT_DEVICE

RB2B

RB2B's JavaScript contains defeat device logic that detects compliance scanners, security tools, and automated browsers, then disables tracking functionality to appear compliant during audits while maintaining full surveillance for real users.

#defeat-device#bot-detection#evasion#critical#rb2b#retention.com
Discovered: 2025-11-09
CRITICAL
9.2BTSS
BTI-2025-0023PUBLISHEDBTI-C12

6sense

A SINGLE PAGE LOAD on 6sense.com triggers an extraordinary surveillance cascade: 13 hosts syncing cookies, 17 hash exfiltrations, PII deanonymization (name + phone), a CMP defeat device harvesting pre-consent data, and TrenDemon SDK with eval()-based arbitrary code execution loading from the compromised polyfill.io domain. ## SUPPLY CHAIN COMPROMISE: polyfill.io on Privacy Policy Page TrenDemon SDK (loaded on 6sense.com) includes a dependency on polyfill.io/v3/polyfill.min.js. This domain was acquired by Chinese company Funnull in February 2024 and subsequently used to inject malicious code into websites. **This script loads while users read 6sense's privacy policy** - the page that should inform them of data practices instead exposes them to a known compromised CDN. 6sense deploys Ketch CMP (documented in BTI-2025-0022 as a consent defeat device) which harvests Marketo tracking cookies from visitors and transmits them to ketchcdn.com. This creates undisclosed cross-vendor identity aggregation where visiting 6sense's Trust Center ironically results in marketing cookie exfiltration. The researcher was identified by name ("Ronin") and geolocated to state level (Alabama) while researching 6sense's privacy practices. This is not a collection of separate issues - it's a coordinated surveillance architecture deployed by a company that sells "privacy-compliant intent data."

#cross-vendor-aggregation#cookie-harvesting#cmp-violation#subprocessor-misrepresentation#pii-deanonymization#device-fingerprinting
Discovered: 2025-12-03
CRITICAL
8.2BTSS
BTI-2025-0004INVESTIGATINGUNDISCLOSED_PROCESSORS

CoPilot AI

CoPilot AI's website deploys 34+ third-party data processors while their GDPR-citing privacy policy discloses only 9 (26% disclosure rate). The pre-consent tracking stack includes browser fingerprinting, 3 IP deanonymization services, 14+ data broker cookie syncs, and 2 undisclosed session recorders. They use a server-side GTM proxy to obscure tracking origins. White-label offering multiplies proliferation risk.

#undisclosed-processors#pre-consent#fingerprinting#cookie-sync#session-recording#ip-deanonymization
Discovered: 2025-11-28
HIGH
8.1BTSS
BTI-2025-0002INVESTIGATINGPRE_SUBMIT_CAPTURE

ZoomInfo

ZoomInfo's FormComplete product captures email addresses from form fields before users click submit, including data populated by browser autofill. The script monitors input field changes and immediately transmits emails to ZoomInfo servers for validation, without any user submission action.

#pre-submit-capture#form-grabbing#autofill#high#zoominfo#formcomplete
Discovered: 2025-11-25
HIGH
8.0BTSS
BTI-2025-0010DRAFTPRE_SUBMIT_CAPTURE

LiveIntent

[AUTO-GENERATED STUB] LiveIntent detected during automated scan. Categorized as Identity Exfiltration: Email hashing, deanonymization, PII extraction. This advisory requires manual review and enrichment.

#auto-generated#stub#liveintent#bti-c02#pre-consent#hash
Discovered: 2025-11-30
CRITICAL
7.8BTSS
BTI-2025-0003INVESTIGATINGHEM_EXTRACTOR

IdentityMatrix

IdentityMatrix's tracking script contains an extractHems() function that scans all browser storage (cookies, localStorage, sessionStorage) looking for email addresses and email hashes. Found values are transmitted for cross-reference against identity graphs for visitor de-anonymization.

#hem-extraction#storage-scanning#identity-resolution#high#identitymatrix
Discovered: 2025-11-25
HIGH
MODULE: SEVERITY_LEGEND
CRITICAL
BTSS 9.0-10.0
HIGH
BTSS 7.0-8.9
MEDIUM
BTSS 5.0-6.9
LOW
BTSS 3.0-4.9
MINIMAL
BTSS 0.0-2.9

BTSS (Browser Trust Safety Score) measures vendor hostility based on BTI category analysis