$blackout --services --list
AGENTLESSOUTSIDE-IN

BLACKOUTSERVICES

Agentless GTM threat intel. Evidence you can act on.

We don't install agents, touch your infra, or ask for API keys. We run controlled browser sessions with honey tokens from the public web, map how your GTM tools behave in runtime, and hand your security, legal, and GTM leaders an evidence pack they can move on.

WHAT BLACKOUT IS

  • Agentless GTM threat intelligence
  • Exploit chains and runtime evidence
  • Outside-in recon on GTM vendors
  • Evidence packs for legal + security

WHAT BLACKOUT IS NOT

  • Generic security rating or posture score
  • Hygiene checks and best-practice nags
  • MarTech review site or marketplace
  • Vibes-based "leaders quadrant"

HOW WE COMPARE

SecurityScorecard

Perimeter hygiene and posture rating

G2 / Review Sites

User reviews and marketing claims

Blackout

Runtime GTM behavior and exploit chains

SERVICE 01

GTM STACK PENTEST

Replay the GTM Kill Chain Against Your Own Stack

We replay the GTM kill chain in a controlled browser session: plant honey tokens, run exploit flows, and document which vendors are currently exploitable—and exactly how. No agents. No SDK. No credentials. No access to your infrastructure.

The output isn't "10,000 minor issues." It's a focused report on what's exploitable now, with evidence chains you can take to legal, security, or the vendor directly.

WHO THIS IS FOR

  • Security / GRC teams who know the CMP banner isn't the whole story.
  • Legal / privacy teams under pressure to prove consent is actually honored in runtime.
  • CMOs / Heads of Growth who want to keep their tools, but stop being the weakest link.

HOW IT WORKS

01

Pick live journeys

We pick 1–3 high-risk flows with you (demo request, checkout / trial, newsletter, "contact sales").

02

Seed honey identities

We generate unique emails / phones / identities and run them through those flows under different consent states.

03

Capture runtime behavior

Controlled browser sessions log scripts, cookies, localStorage, and network calls—no agents, no access, no SDK.

04

Trace misuse

We trace where your honey tokens go: which tools touch them, which vendors send them off-site, and who ignores your consent state.

05

Classify risk

Each tool in the flow is classified by: consent & compliance risk, data exfiltration risk, and "behaves like malware" flags.

WHAT YOU GET

  • GTM Attack Surface Map

    Diagrams and tables of every script, pixel, SDK, and endpoint present in the tested journeys.

  • Consent Integrity Report

    Evidence of pre-consent tracking, post-reject tracking, consent bypass logic, and any dark patterns discovered.

  • Honey Token Chain of Custody

    For each test identity: timestamps, consent state, vendors that touched it, and any out-of-bounds data use.

  • Paralegal-grade Evidence Pack

    HARs, header snippets, cookie/storage dumps, and human-readable summaries aligned to regulatory language.

  • Remediation Plan

    Concrete recommendations: what to block, what to sandbox, and which contracts or DPAs need new language.

WHAT WE NEVER ASK FOR

No source code.

No database or warehouse access.

No OAuth tokens or admin credentials.

No agents or SDKs in your environment.

If an attacker or shady vendor can see it from the browser, so can we. That's the only vantage point we use.

SERVICE 02

VENDOR RISK MAP

"Who's Stealing From You?" Evidence Pack

We overlay your GTM vendor list with Blackout's threat intelligence and escalate the vendors where: runtime behavior is actively exploitable, or where docs and DPAs are materially contradicted by observable behavior.

This is not a giant vendor catalog. We don't score every tool on vague criteria. We flag the ones that matter—the ones where there's an exploit path and a consequence.

WHO THIS IS FOR

  • CISOs / security architects who need a vendor risk model beyond "do they have SOC 2."
  • GCs / privacy officers who need to know where data is actually going—not just what the DPA says.
  • CFOs / CROs who are sick of vendors claiming "we drove this revenue" with numbers no one can reconcile.

HOW IT WORKS

01

Inventory your tools

We normalize your GTM vendor list into categories (analytics, orchestration, identity, enrichment, "dark" vendors, etc.).

02

Overlay Blackout Intel

We correlate your vendor list with what we've already documented: consent bypasses, cookie theft, attribution stuffing, graph-building.

03

Score the risk

Each vendor is rated across: data exfiltration risk, consent & regulatory risk, attribution & revenue integrity risk.

04

Flag the thieves

We identify vendors that siphon your first-party data into their own graphs, hijack attribution credit, or behave like external data brokers.

WHAT YOU GET

  • Vendor Risk Matrix

    Every GTM vendor scored across exfiltration, consent, attribution, and graph risk—with clear "Monitor, Limit, Sandbox, Replace, Terminate" recommendations.

  • High-Risk Vendor Dossiers

    Multi-page dossiers on high-risk vendors with: public claims vs observed behavior, known exploit patterns, implications for legal/compliance.

  • "Who's Stealing From You" Executive Summary

    A board-safe overview explaining: who is using your data as raw material, how your revenue narrative is being distorted, and what it takes to reassert control.

  • Control Layer Recommendations

    Concrete options: reverse proxies, CSP rules, GTM changes, contract language, or vendor replacements.

NOT SURE WHERE TO START?

Start with the GTM Stack Pentest if…

  • You suspect your CMP banner is a lie in runtime.
  • You've got high-risk flows (checkout, demo, auth) with too many tags.
  • Legal or privacy have started asking "are we actually compliant?"
  • You need evidence from your own site to drive changes.

Start with the Vendor Risk Map if…

  • You already know your vendor list is out of control.
  • You want a prioritized "kill / sandbox / watch" list before renewal season.
  • Your board or CFO keeps asking "which tools are non-negotiable?"
  • You want to understand who's using your data as fuel.

> Most teams start with the GTM Stack Pentest, then roll into a Vendor Risk Map once they see how bad the problem really is.

HOW A BLACKOUT ENGAGEMENT WORKS

1

Scoping Call

30–45 min

You bring your GTM, security, and legal leads. We map your highest-risk flows and tools.

2

Recon + Analysis

1–3 weeks

We run the tests, correlate with our threat intel, and build your evidence pack. No agents, no access.

3

Review + Decision

Working session

We walk your team through the findings, answer hard questions, and decide what gets monitored, sandboxed, or killed.