Your CRM is an attack surface.
The vendor your marketing team approved can read your CEO's emails, your deal strategy, your competitive positioning, and your pricing decisions. Through OAuth scopes you never audited.
▸ OAuth scopes granted
- + contacts.read
- + accounts.read
- + deals.read
- + pipeline.read
- + activities.read
- + emails.read
▸ Documented product requirement
emails.read · NONE FOUND
▸ Records accessible
8,400
logged email activities · 18-month integration
For every scope a vendor holds: what feature requires it?
contacts.read
Often justified
Vendor needs to sync contacts for their core product to function. Defensible.
accounts.read
Sometimes justified
ABM tools have a documented need for account-level data. Audit per-vendor.
deals.read · pipeline.read
Rarely justified
What intent-data product requires knowing your deal values and close dates?
emails.read · activities.read
Almost never justified
What non-CRM vendor requires read access to internal email threads?
We don't claim the vendor is misusing the data. We show what they CAN access, what their docs say they NEED, and the gap. You draw the conclusion.
Run the test. Get the gap.
● Unexplained access surface · 4 of 6 scopes
Records accessible: 14,232 contacts · 340 active deals · ~8,400 logged email activities. Last vendor API pull: 2026-04-27 09:14 UTC. Integration age: 18 months. Data persistence risk: HIGH.
Six things a vendor with email scope can already see.
Internal deal strategy
Competitive positioning, pricing decisions, discount willingness, deal risk notes.
Deal record fields, activity notes, email threads logged to CRM.
Executive communications
CEO and C-suite correspondence flowing through CRM-connected email.
Email activity sync, activity logging.
Org structure
Who talks to whom, how often, about which accounts.
Communication-pattern analysis from activity data.
Hiring & contraction signals
New users appearing or disappearing, account reassignment patterns.
CRM user activity, account-ownership changes.
Competitive intelligence
Which competitors are tracked, where you're losing, why.
Account fields, competitive tags, lost-deal reasons.
Recruitment & expansion
Expansion plans, new market entry, geographic growth.
New deal stages for new product lines, career-page traffic patterns.
The other attack surface. In your browser.
Your DPA covers the vendor you signed with. It doesn't cover the vendors they load at runtime, or the vendors those vendors load.
The methodology calls this an undisclosed subprocessor amplification. Each layer adds exposure your team cannot assess, audit, or consent to.
Your contract bound 1 of 4 nodes. The other 3 sit outside your governance perimeter.
The artifact your AppSec already knows how to read.
▸ engineering-evidence-package.zip
SHA-256 chain of custody · ISO-8601 timestamps · HAR + payload hashes
Map the gap. Close the gap.
Run a scan. Get your full client-side dependency tree and OAuth scope audit in 60 seconds. No agent install. No code change.
▸ Free · No signup · No credit card · 600+ vendor signatures