How This Briefing Works
This report opens with key findings, then maps the gaps between what Crayon discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“Awaiting scanner verification”
Runtime behavior of Crayon tracking scripts or embedded widgets on customer websites has not been independently observed
pending
“Web scraping methodology unverified”
The specific crawling frequency, IP rotation practices, and robots.txt compliance of Crayon's scraping infrastructure need investigation
pending
“Data retention and deletion practices unclear”
How long Crayon retains archived competitor website snapshots and whether monitored organizations can request deletion needs clarification
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Crayon
- →- Assess whether your organization is likely being monitored through Crayon or similar competitive intelligence platforms by evaluating your competitive landscape and market visibility. - Review what strategic intelligence is exposed through your public digital footprint - pricing pages, job postings, support documentation, and product changelog may all be systematically harvested. - Implement deliberate information hygiene practices for public-facing content that may reveal strategic intent to competitive intelligence scrapers. - If deploying Crayon, establish ethical guidelines for competitive intelligence use and ensure compliance with web scraping regulations in relevant jurisdictions. - Monitor for unusual crawling patterns on your website that may indicate systematic competitive intelligence collection.
Negotiation Leverage
- →Crayon operates in the competitive intelligence market where data collection practices exist in a regulatory gray area. Key leverage points: (1) If your organization is a Crayon customer, demand transparency on which of your competitors are also Crayon customers and whether your data is inadvertently enriching their competitive intelligence. (2) Request explicit data handling policies for any personal information collected through web scraping. (3) Negotiate contractual restrictions on how Crayon uses aggregated competitive data from your account to benefit other customers or train AI models. (4) Verify GDPR compliance for EU-based competitor monitoring, particularly regarding the collection of personal professional data from public sources. Crayon's pricing is enterprise-level and opaque - request detailed breakdowns and benchmark against alternatives like Klue and Kompyte.
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Keystroke/mouse tracking
Full session replay
Identity stitching
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
103 detection signatures across scripts, domains, cookies, and network endpoints