All Vendors
deanon

G2

G2 combines visitor identification with consent bypass, creating dual liability. Moderate Broker risk through review platform intelligence, severe Counselor violations via pre-consent identity resolution.

16 IOCs85 detections54% pre-consent65 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what G2 discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

85 detections across 65 sites54% pre-consent activity
CRITICAL

Pre-Consent Activity

G2 was observed loading and executing before user consent was obtained on 54% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps
Customer Impact

What This Means For You

Sales teams gain visitor intelligence but inherit identity resolution liability without consent. Marketing teams face GDPR dual violation: consent bypass PLUS unlawful processing of personal data. Compliance teams must defend visitor tracking on review platform (where users expect privacy) to regulators.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use G2

  • Disable G2 Buyer Intent tracking in admin panel immediately
  • Request deletion of all historical visitor identification data
  • Audit current G2 pixel deployment: remove from website if present

If You're Evaluating G2

  • Require G2 to demonstrate consent-first architecture before contract renewal
  • Demand contractual liability shift: vendor assumes 100% penalty risk for identity resolution violations
  • Evaluate alternatives: anonymous review tracking (no identity resolution) or review platforms without surveillance (TrustRadius privacy mode)

Negotiation Leverage

  • G2 combines consent bypass with identity resolution, creating compounded GDPR Article 6 + Article 7 liability
  • Vendor must eliminate pre-consent tracking AND obtain explicit consent for identity resolution, or assume full regulatory penalty exposure
  • Review platforms should not require visitor surveillance - users expect product research privacy, not sales intelligence capture
  • Current architecture processes personal data (names, companies) without consent, transparent disclosure, or documented legitimate interest
Runtime Detections

Runtime Detections

3 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C08Cross-Domain Sync

Identity stitching

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: Identity resolution tracking loads before consent opportunity, creating per-visitor GDPR Article 7 violation. Combined with personal data processing (names, companies, emails), elevates to Article 6 unlawful processing liability.

BTI-C14Identity Resolution

PII deanonymization

Impact: Cross-site tracking and device fingerprinting resolve anonymous visitors to named individuals/companies. Creates personal data processing without consent, transparent disclosure, or legitimate interest assessment required by GDPR Article 6.

IOC Manifest

IOC Manifest

16 INDICATORS

Indicators of compromise across 5 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*www.g2.com/cdn-cgi/challenge-platform/scripts/jsd/main.js*
Tracking script
TRACK
*www.g2.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/*/main.js*
Tracking script
TRACK
tracking.g2crowd.com
Tracking script
TRACK
www.g2.com/cdn-cgi/challenge-platform/scripts/jsd/main.js
Auto-extracted from scan
TRACK
www.g2.com/cdn-cgi/challenge-platform/h/b/scripts/jsd/7f3d2ee44814/main.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

G2 operates as B2B review platform with embedded visitor intelligence. Competes with Capterra, TrustRadius (review platforms) and 6sense, Clearbit (identity resolution). Unique risk: review platform trust + tracking infrastructure creates cognitive dissonance - users expect product research, not surveillance.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

16 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details