BTIBTI-2025-0004
8.2BTSS

CoPilot AI

CoPilot AI: Massive Undisclosure of Data Processors with Pre-Consent Tracking

Parent Company: Cassia Research Inc.

Version
1
Discovered
2025-11-28
Est. Deployments
5,000+
THE TAKE

CoPilot AI's website deploys 34+ third-party data processors while their GDPR-citing privacy policy discloses only 9 (26% disclosure rate). The pre-consent tracking stack includes browser fingerprinting, 3 IP deanonymization services, 14+ data broker cookie syncs, and 2 undisclosed session recorders. They use a server-side GTM proxy to obscure tracking origins. White-label offering multiplies proliferation risk.

This advisory exists to warn companies running CoPilot AI on their sites. We do not notify vendors. We do not provide remediation windows. If you're using this vendor, this is your evidence.

//PREVALENCE
5,000+
Estimated Deployments
Market Segments
Sales AutomationLinkedIn ToolsAI SDRLead Generation
Notable Deployments
  • White-label partners (unknown count)
//IF_YOU_ARE_RUNNING_THIS

If You're Running CoPilot AI

immediate

Remove or disclose all 34+ data processors in privacy policy

Effort: moderate
immediate

Implement consent-gated tag loading (CMP integration)

Effort: significant
short term

Remove FingerprintJS and HubSpot fingerprinting

Effort: moderate
short term

Audit and remove unnecessary data broker syncs

Effort: moderate
short term

Remove server-side GTM proxy or disclose its purpose

Effort: trivial
//REVENUE_IMPACT

What It Costs You

CAC Subsidization

Visitor data captured on a site can flow into data broker networks and identity graphs, eventually surfacing in competitor prospecting tools. The original company paid to acquire the traffic; competitors pay pennies to intercept the lead.

Signal Corruption

Overlapping tracking mechanisms corrupt attribution data. Multiple sources claim credit for single conversions. Pipeline metrics diverge from reality. Marketing decisions get made on numbers that can’t be trusted.

Legal Tail Risk

Pre-consent data collection, undisclosed data sharing, and consent signal violations create regulatory exposure. Class actions and regulatory fines can exceed entire annual marketing budgets. Liability sits with the site owner, not the vendor.

GTM Attack Surface

Third-party scripts execute with full privileges on every page load. Dangerous code patterns, external dependencies, and data interception turn marketing infrastructure into attack vectors. One compromised dependency compromises the entire site.

//THE_MECHANISMS_OF_TAKING

BTI-C: Behavioral Codes

//WHY_THIS_MATTERS

Attack Parallel: Privacy Policy Fraud

Material misrepresentation of data processing activities

Reference
//BTSS_BREAKDOWN

BTSS Score Breakdown

Exploitability
9/ 4
Data Sensitivity
8/ 3
Prevalence
6/ 2
Detection Difficulty
7/ 1
//TECHNICAL_EVIDENCE

Technical Evidence

On page load, before any user interaction or consent, CoPilot AI fires 298+ network requests to 40+ unique domains. This includes analytics, advertising pixels, session recording initialization, browser fingerprinting, IP-to-company lookups, and a 14-member data broker cookie sync network. A Finsweet cookie consent banner is present but does not gate any tracking. Server-side GTM proxy at gtm.copilotai.com obscures some tracking origins.

Code Evidence

httpNetwork capture

IP Deanonymization - ipwhois.pro with exposed API key

GET https://ipwhois.pro/?key=16jpIhWjg0BuB4PP
# Returns company name, ISP, geolocation from visitor IP
httpNetwork capture

IP Deanonymization - ip-api.com with exposed API key

GET https://pro.ip-api.com/json/?key=jBo9qeFtLp00zjm
# Secondary IP lookup service
httpNetwork capture

Visitor Enrichment API - expertise.ai

POST https://api.expertise.ai/v0/location/us-east-1/visitor-enrichment/waterfall
# Active visitor deanonymization via third-party AI chatbot
javascriptPage source

FingerprintJS loaded via Knorex ad platform

<script src="https://cdn.brand-display.com/sv/js/fingerprint3.min.js"></script>
// Browser fingerprinting for cross-site tracking
httpNetwork capture

HubSpot Browser Fingerprint ID

GET https://track.hubspot.com/__ptq.gif?bfp=2389246449&...
# bfp = browser fingerprint parameter
httpNetwork capture

Server-side GTM proxy obscuring tracking

GET https://gtm.copilotai.com/9gkhbqizklofn.js?e8scxq1u=aWQ9R1RNLVRXRzlaQkw%3D
# First-party domain proxying Google Tag Manager
# Decoded: id=GTM-TWG9ZBL

Network Evidence

GEThttps://static.hotjar.com/c/hotjar-6520913.js

Undisclosed session recording - Hotjar

GEThttps://www.clarity.ms/tag/undefined

Undisclosed session recording - Microsoft Clarity

GEThttps://idsync.rlcdn.com/708804.gif?partner_uid=...

LiveRamp data broker cookie sync

GEThttps://pixel.tapad.com/idsync/ex/receive?partner_id=3021

Tapad cross-device graph sync

GEThttps://ib.adnxs.com/setuid?entity=442

AppNexus ad exchange cookie sync

GEThttps://match.adsrvr.org/track/cmf/generic?ttd_pid=tapad

The Trade Desk DSP sync

GEThttps://s.amazon-adsystem.com/dcm?pid=...

Amazon advertising sync

//EVIDENCE_PACKAGE

Evidence Package

Reproduction Steps

1. Open browser DevTools Network tab
2. Navigate to https://copilotai.com
3. Do NOT interact with any consent banner
4. Observe 298+ network requests to 40+ domains
5. Filter for: ipwhois, ip-api, fingerprint, rlcdn, tapad, hotjar, clarity
6. Compare disclosed processors in /privacy-policy to actual network activity
//LEGAL_TOUCHPOINTS

Legal Touchpoints

GDPR Article 13EU

Failure to disclose identity of data recipients at time of collection

GDPR Article 14EU

Failure to provide information about third-party data sources

GDPR Article 7EU

Processing without valid consent - tracking fires pre-consent

ePrivacy Directive Article 5(3)EU

Storing cookies/fingerprints without prior informed consent

CCPA §1798.100California

Failure to disclose categories of third parties with whom PI is shared

PIPEDA Principle 4.3Canada

Collection without knowledge/consent of individual

//CITATION_TEMPLATES

Citation Templates

For Contracts / DPAs
“Vendor shall not engage in behaviors classified under BTI-2025-0004 (CoPilot AI), including UNDISCLOSED_PROCESSORS (UNDISCLOSED_PROCESSORS).”
For Compliance Reports
“BTI Advisory BTI-2025-0004 documents CoPilot AI engaging in UNDISCLOSED_PROCESSORS (BTSS 8.2, HIGH).”
For Email / Communication
“We have identified CoPilot AI as exhibiting UNDISCLOSED_PROCESSORS behavior per BTI Advisory BTI-2025-0004. Full details: deployblackout.com/bti/BTI-2025-0004
//RELATED_ADVISORIES
//FRAMEWORK_MAPPINGS
MITRE ATT&CK
T1119
Automated Collection
Tactic: Collection
PCI DSS 4.0
Requirement 12
12.8 - Service Provider Management
OWASP Client-Side
CWE-359: Exposure of Private Personal Information
Created: 2025-11-28Updated: 2025-11-28Version: 1
#undisclosed-processors#pre-consent#fingerprinting#cookie-sync#session-recording
Permanent URL: deployblackout.com/bti/BTI-2025-0004