Runtime vendor intelligence. Outside-in reconnaissance. Evidence-grade output.
Client-side runtime telemetry. Real behavior, not claims.
Programmatic access. Integrate into your stack.
Contracted vs. runtime vendors
Privacy policy vs. JavaScript behavior
Supply chain + data broker mapping
CAC subsidy + attribution corruption
Scripts firing before user consent
SOC 2 scope gaps + defeat devices
Blackout Blocklist
Curated blocklists. Domains, scripts, behaviors.
Blackout Threat Severity Scoring
Risk quantification. CAC, legal, attack surface.