How This Briefing Works
This report opens with key findings, then maps the gaps between what Clearbit discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Data Sale
Explicitly sells personal information per privacy policy
Consent
64.7% pre-consent tracking rate, 11 vendors fire before consent on own site
Pre-Consent Activity
Clearbit was observed loading and executing before user consent was obtained on 65% of sites where it was detected.
Subprocessor Disclosure
16+ additional vendors detected on clearbit.com
Signal Honoring
GPC/DNT explicitly not honored
Claims vs. Observed Behavior
Data Sale
“CCPA compliant”
Explicitly sells personal information per privacy policy
Privacy policy states: Clearbit may sell your personal information
Consent
“GDPR compliant”
64.7% pre-consent tracking rate, 11 vendors fire before consent on own site
Runtime scan of clearbit.com shows CustomerIO, Google Ads, MetaPixel, etc. loading pre-consent
Subprocessor Disclosure
“11 subprocessors listed”
16+ additional vendors detected on clearbit.com
Subprocessor page lists AWS, GCP, Zendesk etc. but not Meta, Google Ads, LinkedIn, RB2B
Signal Honoring
“CCPA opt-out available”
GPC/DNT explicitly not honored
Privacy policy: We do not currently recognize or respond to browser-initiated Do Not Track signals
Identity Resolution
“De-identify information collected”
Core product is identity resolution (Reveal) that re-identifies anonymous visitors
Product page describes revealing anonymous website traffic as companies
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Clearbit
- →Audit your consent implementation — their 64.7% pre-consent rate suggests consent may fire after tracking begins
- →Update your privacy policy to disclose Clearbit as a data processor AND their undisclosed subprocessors
- →Document lawful basis for identity resolution (legitimate interest alone likely insufficient under GDPR)
- →Implement server-side enrichment only to avoid client-side data leakage to ad networks
- →Request their full subprocessor list including ad tech vendors visible in runtime
If You're Evaluating Clearbit
- →Request proof that SOC2/GDPR compliance covers their advertising pixel usage
- →Ask how GPC non-compliance aligns with their CCPA certification
- →Clarify data flows between Clearbit and HubSpot (shared infrastructure = shared risk)
- →Evaluate alternatives that do not explicitly sell personal information
- →Consider server-side only integration to minimize third-party script exposure
Negotiation Leverage
- →Liability indemnification: Vendor assumes full liability for the 64.7% pre-consent tracking rate observed across deployments, including GDPR fines (4% global revenue) and class action settlements
- →Subprocessor disclosure requirement: Vendor must provide complete list of ALL third-party data recipients within 10 days. Current gap of 16+ undisclosed vendors (Meta, Google Ads, LinkedIn, RB2B, etc.) must be documented and approved
- →Pre-consent SLA: Vendor guarantees 0% pre-consent activity with liquidated damages of $25,000 per violation detected by independent audit. Current 64.7% rate is material breach
- →Right to independent verification: Customer may engage third-party auditor to verify consent compliance and subprocessor disclosure on live deployment without prior notice
- →Data sale opt-out: Given privacy policy explicitly states Clearbit may sell your personal information, require amendment prohibiting sale of data originating from customer deployment, or provide CCPA-compliant opt-out mechanism that honors GPC signals
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Form data interception
Keystroke/mouse tracking
Full session replay
Identity stitching
Ignoring CMP signals
Device identification
Long-lived identifiers
PII deanonymization
Container/loader (neutral)
IOC Manifest
Indicators of compromise across 6 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
143 detection signatures across scripts, domains, cookies, and network endpoints
HAR Forensics
| Destination | Algorithm |
|---|---|
