How This Briefing Works
This report opens with key findings, then maps the gaps between what CleverTap discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“Awaiting scanner verification”
Signature-only assessment pending runtime observation
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for CleverTap
- →Audit the custom events your development team has configured in the CleverTap SDK to understand exactly what behavioral data is being collected. Review whether CleverTap's Privacy by Design defaults are properly configured (location and network auto-collection should remain disabled unless explicitly justified). Verify that your app's privacy policy and App Store/Play Store privacy labels accurately reflect the scope of data CleverTap collects. Assess whether PII tokenization is enabled for sensitive user attributes to prevent personally identifiable information from entering CleverTap's environment. Review attribution partner integrations to understand what third-party data is flowing into CleverTap user profiles. Establish data retention policies within CleverTap that align with your data minimization requirements.
Negotiation Leverage
- →CleverTap's deep SDK integration gives it privileged access to application-layer behavioral data that is difficult to replicate with alternative tools, creating significant switching costs. When negotiating: (1) Demand a detailed data processing inventory listing every data point the SDK collects by default versus what is custom-configured. (2) Negotiate data isolation guarantees — confirm that your user behavioral data is not used for CleverTap's own product improvement, benchmarking, or aggregate analytics shared with other customers. (3) Request contractual data retention limits with automated purging for behavioral event data. (4) Clarify sub-processor arrangements, particularly for attribution partner data that enters CleverTap via integrations you may not have directly authorized. (5) For HIPAA-regulated applications, ensure the BAA explicitly covers SDK-collected behavioral data, not just messaging delivery infrastructure.
IOC Manifest
Indicators of compromise across 3 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
89 detection signatures across scripts, domains, cookies, and network endpoints