How This Briefing Works
This report opens with key findings, then maps the gaps between what ContentSquare discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Subprocessor Disclosure
52 vendors detected, only 16 infrastructure/support processors disclosed. Marketing and analytics vendors completely absent.
Compliance Certification
66.7% pre-consent tracking rate on own website. 21 vendors load before consent.
Pre-Consent Activity
ContentSquare was observed loading and executing before user consent was obtained on 67% of sites where it was detected.
Identity Resolution
Identity resolution vendors (Apollo.io, Clearbit, Demandbase, RB2B) actively de-anonymizing visitors
DNT/GPC Handling
Explicitly states: we currently do not respond to such Do Not Track signals
Claims vs. Observed Behavior
Subprocessor Disclosure
“Subprocessor list identifies data processors”
52 vendors detected, only 16 infrastructure/support processors disclosed. Marketing and analytics vendors completely absent.
Runtime scan vs https://contentsquare.com/privacy-center/subprocessors/
Compliance Certification
“SOC2 Type II, ISO 27001 certified”
66.7% pre-consent tracking rate on own website. 21 vendors load before consent.
Trust Center certifications vs runtime detection data
Identity Resolution
“Experience intelligence platform (analytics)”
Identity resolution vendors (Apollo.io, Clearbit, Demandbase, RB2B) actively de-anonymizing visitors
Vendor detection on contentsquare.com
DNT/GPC Handling
“Cookie policy provides opt-out mechanisms”
Explicitly states: we currently do not respond to such Do Not Track signals
https://contentsquare.com/privacy-center/cookie-policy/
Pre-Consent Tracking
“CNIL Exemption Mode available”
21 third-party vendors loading before consent including identity resolution
Runtime scan pre_consent=true detections
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use ContentSquare
- →Audit your Contentsquare implementation for pre-consent loading behavior — verify your CMP gates all Contentsquare scripts
- →Review what third-party scripts Contentsquare deploys on your properties beyond their core analytics
- →Verify your CMP configuration accounts for all Contentsquare-introduced vendors, not just Contentsquare itself
- →Request clarity on data flows between Contentsquare, Hotjar, Heap, and other acquired platforms
If You're Evaluating ContentSquare
- →Request the SOC2 Type II report and verify the scope covers third-party vendor management controls
- →Compare Contentsquare's actual vendor footprint against certifications before making compliance assumptions
- →Test implementation in staging and audit all network requests beyond Contentsquare's core domain
- →Negotiate data isolation guarantees preventing your session data from contributing to cross-customer analytics
Negotiation Leverage
- →Certification gap: SOC2 Type II and ISO 27001 certifications coexist with 52 undisclosed vendors — use this to question the scope of certifications and negotiate audit rights
- →Acquisition consolidation: Hotjar, Heap, Clicktale, and Loris.ai data consolidated under one entity serving 1.3M+ sites — negotiate data isolation guarantees preventing cross-customer analytics
- →Subprocessor disclosure gap: Only infrastructure providers disclosed while 52 vendors detected including marketing and adtech — require named vendor disclosure as a contract condition
- →Session replay sensitivity: Contentsquare captures granular user behavior data — leverage this data sensitivity to negotiate enhanced data protection and retention limits
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Keystroke/mouse tracking
Full session replay
Identity stitching
Ignoring CMP signals
Device identification
Long-lived identifiers
Container/loader (neutral)
IOC Manifest
Indicators of compromise across 5 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
145 detection signatures across scripts, domains, cookies, and network endpoints