$blackout --services --list
AGENTLESSOUTSIDE-IN

BLACKOUTSERVICES

Agentless GTM threat intel. Evidence you can act on.

We don't install agents, touch your infra, or ask for API keys. We run controlled browser sessions with honey tokens from the public web, map how your GTM tools behave in runtime, and hand your security, legal, and GTM leaders an evidence pack they can move on.

WHAT BLACKOUT IS

  • Agentless GTM threat intelligence
  • Exploit chains and runtime evidence
  • Outside-in recon on GTM vendors
  • Evidence packs for legal + security

WHAT BLACKOUT IS NOT

  • Generic security rating or posture score
  • Hygiene checks and best-practice nags
  • MarTech review site or marketplace
  • Vibes-based "leaders quadrant"

HOW WE COMPARE

SecurityScorecard

Perimeter hygiene and posture rating

G2 / Review Sites

User reviews and marketing claims

Blackout

Runtime GTM behavior and exploit chains

SERVICE 01

GTM STACK PENTEST

Replay the GTM Kill Chain Against Your Own Stack

We replay the GTM kill chain in a controlled browser session: plant honey tokens, run exploit flows, and document which vendors are currently exploitable—and exactly how. No agents. No SDK. No credentials. No access to your infrastructure.

The output isn't "10,000 minor issues." It's a focused report on what's exploitable now, with evidence chains you can take to legal, security, or the vendor directly.

WHO THIS IS FOR

  • Security / GRC teams who know the CMP banner isn't the whole story.
  • Legal / privacy teams under pressure to prove consent is actually honored in runtime.
  • CMOs / Heads of Growth who want to keep their tools, but stop being the weakest link in the company's security posture.

HOW IT WORKS

01

Pick live journeys

We pick 1–3 high-risk flows with you (demo request, checkout / trial, newsletter, "contact sales").

02

Seed honey identities

We generate unique emails / phones / identities and run them through those flows under different consent states (accept all, reject all, withdraw, ignore).

03

Capture runtime behavior

Controlled browser sessions log scripts, cookies, localStorage, and network calls—no agents, no access, no SDK.

04

Trace misuse

We trace where your honey tokens go: which tools touch them, which vendors send them off-site, and who ignores your consent state.

05

Classify risk

Each tool in the flow is classified by: consent & compliance risk, data exfiltration risk, and "behaves like malware" flags.

WHAT YOU GET

  • GTM Attack Surface Map

    Diagrams and tables of every script, pixel, SDK, and endpoint present in the tested journeys.

  • Consent Integrity Report

    Evidence of pre-consent tracking, post-reject tracking, consent bypass logic, and any dark patterns discovered.

  • Honey Token Chain of Custody

    For each test identity: timestamps, consent state, vendors that touched it, and any out-of-bounds email or data use.

  • Paralegal-grade Evidence Pack

    HARs, header snippets, cookie/storage dumps, and human-readable summaries aligned to regulatory language.

  • Remediation Plan

    Concrete recommendations: what to block, what to sandbox, and which contracts or DPAs need new language.

WHAT WE NEVER ASK FOR

No source code.

No database or warehouse access.

No OAuth tokens or admin credentials.

No agents or SDKs in your environment.

If an attacker or shady vendor can see it from the browser, so can we. That's the only vantage point we use.

SERVICE 02

VENDOR RISK MAP

"Who's Stealing From You?" Evidence Pack

We overlay your GTM vendor list with Blackout's threat intelligence and escalate the vendors where: runtime behavior is actively exploitable, or where docs and DPAs are materially contradicted by observable behavior.

This is not a giant vendor catalog. We don't score every tool on vague criteria. We flag the ones that matter—the ones where there's an exploit path and a consequence.

WHO THIS IS FOR

  • CISOs / security architects who need a vendor risk model beyond "do they have SOC 2."
  • GCs / privacy officers who need to know where data is actually going—not just what the DPA says.
  • CFOs / CROs who are sick of vendors claiming "we drove this revenue" with numbers no one can reconcile.

WHAT WE NEED FROM YOU

  • A list of your GTM vendors: analytics, ESP/CDP/CRM, ABM, intent, deanonymization, session replay, CMP, enrichment.
  • Any public/privacy docs and DPA language they have shared.
  • (Optional) Runtime data from a Blackout GTM Stack Pentest, if we've already run one.

HOW IT WORKS

01

Inventory your tools

We normalize your GTM vendor list into categories (analytics, orchestration, identity, enrichment, "dark" vendors, etc.).

02

Overlay Blackout Intel

We correlate your vendor list with what we've already documented in the wild: consent bypasses, cookie theft, attribution stuffing, graph-building, and shadow subprocessors.

03

Score the risk

Each vendor is rated across: data exfiltration risk, consent & regulatory risk, attribution & revenue integrity risk, and strategic "you are the product" graph risk.

04

Flag the thieves

We identify vendors that siphon your first-party data into their own graphs, hijack attribution credit, or behave like an external data broker hiding behind "marketing performance."

WHAT YOU GET

  • Vendor Risk Matrix

    A spreadsheet/Notion-ready matrix with every GTM vendor scored across exfiltration, consent, attribution, and graph risk—with clear "Monitor, Limit, Sandbox, Replace, Terminate" recommendations.

  • High-Risk Vendor Dossiers

    Multi-page dossiers on high-risk vendors with: public claims vs observed behavior, known exploit patterns, implications for legal/compliance, security, and revenue reporting.

  • "Who's Stealing From You" Executive Summary

    A board-safe overview that explains: who is using your data as raw material, how your revenue narrative is being distorted, and what it will take to reassert control.

  • Control Layer Recommendations

    Concrete options: reverse proxies, CSP rules, GTM changes, contract language, or vendor replacements.

All of this is derived from public-surface intel and your vendor list. We do not plug into your systems to build the risk model.

NOT SURE WHERE TO START?

Start with the GTM Stack Pentest if…

  • You suspect your CMP banner is a lie in runtime.
  • You've got high-risk flows (checkout, demo, auth) with too many tags.
  • Legal or privacy have started asking "are we actually compliant?"
  • You need evidence from your own site to drive changes.

Start with the Vendor Risk Map if…

  • You already know your vendor list is out of control.
  • You want a prioritized "kill / sandbox / watch" list before renewal season.
  • Your board or CFO keeps asking "which tools are non-negotiable?"
  • You want to understand who's using your data as fuel across the ecosystem.

> Most teams start with the GTM Stack Pentest, then roll into a Vendor Risk Map once they see how bad the problem really is. We'll tell you honestly if you're over-buying or under-reacting.

HOW A BLACKOUT ENGAGEMENT WORKS

1

Scoping Call

30–45 min

You bring your GTM, security, and legal leads. We map your highest-risk flows and tools.

2

Recon + Analysis

1–3 weeks

We run the tests, correlate with our threat intel, and build your evidence pack. No agents, no access, no integration.

3

Review + Decision

Working session

We walk your team through the findings, answer hard questions, and decide together what gets monitored, sandboxed, or killed.