PLATFORMVENDOR_INTEL
GTM VENDOR INTELLIGENCE

KNOW EVERY VENDOR.
BEFORE THEY KNOW YOU.

The first threat intelligence platform purpose-built for GTM risk. Search 500+ vendors. Get instant risk verdicts. See the evidence.

SecurityScorecard rates companies. We rate the vendors inside those companies—the scripts, pixels, and SDKs that actually touch your visitors.

SEE HOW IT WORKS
500+
Vendors Tracked
115
BLK Controls
24/7
Continuous Monitoring
VENDOR INTEL
LIVE
Search vendors, domains, behaviors...
6sense9.2CRITICAL
Intent Data • Pre-consent exfil • 4 BLK violations
Clearbit7.8HIGH
Data Enrichment • Identity resolution • 2 BLK violations
HubSpot5.4MEDIUM
Marketing Automation • Cookie tracking • 1 BLK violation
Plausible1.2LOW
Privacy Analytics • No cookies • 0 BLK violations
THE PROBLEM

YOUR VENDORS ARE A BLIND SPOT

You vet companies before signing contracts. But do you know what their scripts actually do once they're on your site?

Invisible Data Flows

Marketing pixels share visitor data with dozens of third parties you never approved.

73%
of sites leak data pre-consent

Defeat Devices

Some vendors detect privacy tools and change behavior to evade detection.

12%
of vendors use defeat devices

Shadow Fingerprinting

Scripts build persistent IDs from canvas, fonts, and hardware specs—without cookies.

34%
of vendors fingerprint visitors
HOW_IT_WORKS
01

SEARCH

Type any vendor name, domain, or behavior. Get instant results from our database of 500+ GTM vendors.

02

SCORE

Every vendor gets a BTSS risk score from 0-10 based on observed behaviors and BLK control violations.

03

EVIDENCE

Drill into HAR captures, network logs, and forensic artifacts. Everything we claim is backed by proof.

BTSS SCORING

ONE SCORE. TOTAL CLARITY.

The Blackout Threat Severity Score (BTSS) quantifies vendor risk based on observed runtime behaviors—not vendor claims or self-reported questionnaires.

9.0-10
CRITICAL
Defeat devices, active exfil, major violations
7.0-8.9
HIGH
Pre-consent tracking, fingerprinting
4.0-6.9
MEDIUM
Excessive data collection, poor consent
0-3.9
LOW
Privacy-respecting, minimal data access

SCORE FACTORS

40%
BLK Control Violations
115 controls covering consent, data, tracking
25%
Data Exfiltration Patterns
What data leaves, where it goes
20%
Fingerprinting Signals
Canvas, fonts, WebGL, hardware
15%
Defeat Device Detection
Behavior changes under observation
CAPABILITIES

Vendor Search

Instant lookup by name, domain, script URL, or behavior category

BTSS Scoring

Quantified risk scores based on observed runtime behaviors

BLK Violations

See exactly which controls each vendor violates

BTI Reports

Deep-dive investigation reports with forensic evidence

Alerts

Get notified when vendor risk levels change

Trending Threats

Track emerging GTM threats across the ecosystem

Domain Scanner

Scan any URL to enumerate vendors and assess risk

Export & API

Pull data into your GRC workflows and reports

Team Access

Share intel across security, legal, and marketing

USE_CASES

Vendor Due Diligence

Before adding a new martech tool, search our database. Know exactly what behaviors to expect and what risks you're accepting.

Used by: RevOps, Marketing, Legal

Third-Party Risk Assessment

Generate evidence-backed risk profiles for your vendor inventory. Replace questionnaire theater with observed behaviors.

Used by: GRC, Security, Compliance

Incident Investigation

When a vendor makes news, instantly pull their full threat profile. Understand exposure before the press calls.

Used by: Security, PR, Legal

Competitive Intel

Scan competitor sites to see their vendor stack. Identify which tools drive their GTM and what risks they've accepted.

Used by: Strategy, Product, Marketing
EARLY ACCESS

KNOW YOUR VENDORS

Join the waitlist for Vendor Intel. Be first to search the most comprehensive GTM threat intelligence database ever built.

Free tier available • No credit card required