All Vendors
marketing_automation

Intercom

Intercom's "customer messaging" widget loads 25 scripts, fires before consent on 51% of observed deployments, and stitches user identity across customer sites — far exceeding what a chat tool requires.

144 IOCs65 detections51% pre-consent42 sites
85
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Intercom discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

65 detections across 42 sites51% pre-consent activity
CRITICAL

Pre-Consent Activity

Intercom was observed loading and executing before user consent was obtained on 51% of sites where it was detected.

GDPRePrivacy
HIGH

Pending Analysis

7 BTI behavioral codes detected across 65 observations on 42 sites. Full claims extraction required for gap analysis.

Disclosure Gaps

Claims vs. Observed Behavior

1 gaps
1 HIGH

Pending Analysis

HIGH
They Claim

Claims analysis pending

Observed Behavior

7 BTI behavioral codes detected across 65 observations on 42 sites. Full claims extraction required for gap analysis.

Customer Impact

What This Means For You

If Intercom is on your site, you are loading 25 scripts for what most visitors perceive as a chat bubble. That payload performs cross-domain identity stitching, behavioral tracking, and device fingerprinting well beyond what customer messaging requires. Your visitors' chat conversations, browsing patterns, and device characteristics flow into Intercom's platform where they are merged into persistent identity profiles. The 51% pre-consent rate means your CMP is likely not controlling Intercom effectively — creating direct ePrivacy liability. Your privacy policy probably describes Intercom as a "customer support tool" while it operates as a cross-site identity resolution platform.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Intercom

  • Audit all 25 Intercom scripts loading on your site — determine which are essential for chat functionality versus tracking
  • Implement strict consent gating that blocks Intercom initialization until affirmative consent is recorded for analytics/tracking purposes
  • Review your Intercom DPA and verify it covers cross-domain sync, identity resolution, and behavioral biometrics
  • Update your privacy policy to accurately describe Intercom's data collection scope beyond customer messaging

If You're Evaluating Intercom

  • Assess whether a lighter-weight chat solution could provide equivalent support without 25 scripts and 7 BTI-C code triggers
  • Request Intercom's data processing records for your specific account to verify what data flows occur
  • Evaluate loading Intercom conditionally — chat-only mode until consent, full suite after explicit opt-in
  • Consider the cost of Intercom's tracking overhead against alternatives like Crisp, Tawk.to, or self-hosted solutions

Negotiation Leverage

  • 25 scripts for a chat widget is indefensible — request Intercom explain why each script is necessary for customer messaging
  • 51% pre-consent firing rate with 7 BTI-C codes — Intercom's deployment creates direct regulatory liability for your organization
  • Cross-domain sync (C08) + identity resolution (C14) means Intercom builds cross-site profiles from your visitors — demand contractual restrictions on cross-customer data use
  • Maximum legal tail risk (100) and CAC subsidization (100) scores — your visitor data enriches Intercom's platform intelligence at your regulatory expense
  • Request a minimal-tracking deployment option that provides chat functionality without behavioral biometrics, fingerprinting, and cross-domain sync
Runtime Detections

Runtime Detections

7 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Intercom deploys evasion infrastructure that can modify its behavior during compliance audits, making it difficult to verify that observed tracking matches what occurs during normal user sessions.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Behavioral tracking goes beyond chat interaction logging. Mouse movement and interaction patterns are captured and associated with user profiles, creating behavioral signatures that persist beyond the chat session.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Identity stitching across Intercom's customer base means a visitor who chats on your site can be recognized on any other Intercom-powered site. Your customer interactions become part of a cross-site identity graph you do not control.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: 51% pre-consent firing rate means Intercom's 25-script payload begins executing before consent tools can intervene. Under ePrivacy and GDPR, the site operator bears liability for this non-essential tracking that activates without lawful basis.

BTI-C10Fingerprinting

Device identification

Impact: Device fingerprinting enables Intercom to maintain persistent identification across sessions even when cookies are cleared, undermining users' ability to meaningfully withdraw consent or reset their tracking state.

BTI-C13Persistence Mechanisms

Long-lived identifiers

Impact: Long-lived identifiers ensure user profiles survive cookie deletion and session resets. Combined with 5 cookies and cross-domain sync, Intercom maintains durable tracking that outlasts standard privacy hygiene.

BTI-C14Identity Resolution

PII deanonymization

Impact: PII deanonymization converts anonymous website visitors into identified contacts within Intercom's platform. Chat interactions, email addresses, and behavioral data merge into unified profiles that persist across your entire customer communication stack.

IOC Manifest

IOC Manifest

117 INDICATORS

Indicators of compromise across 6 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*www.intercom.com/_next/static/chunks/webpack-*.js*
Tracking script
TRACK
*www.intercom.com/_next/static/chunks/*-*.js*
Tracking script
TRACK
*www.intercom.com/_next/static/chunks/main-app-*.js*
Tracking script
TRACK
*www.intercom.com/_next/static/chunks/app/layout-*.js*
Tracking script
TRACK
*www.intercom.com/_next/static/chunks/app/(home)/page-*.js*
Tracking script
TRACK
*www.intercom.com/_next/static/chunks/*.*.js*
Tracking script
TRACK
*www.intercom.com/_next/static/chunks/661-*.js*
Tracking script
TRACK
*www.intercom.com/_next/static/chunks/784-*.js*
Tracking script
TRACK
*www.intercom.com/_next/static/chunks/app/suite/page-*.js*
Tracking script
TRACK
widget.intercom.io
Tracking script
TRACK
js.intercomcdn.com
Tracking script
TRACK
www.intercom.com/_next/static/chunks/webpack-decc1ae2e36925ac.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/4bd1b696-7538a7d04279e63d.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/3794-ecfe629e1f4e0bef.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/main-app-fb923441230fa6c6.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/1201-139050f884d331a2.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/2665-968db24d0cd71689.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/3437-07f47cc057546d83.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/5118-91bc129809ff481f.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/app/layout-5616ad367e1cb9e4.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/1e75d386-efc0f0fc13289141.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/9115-17019c6092b0ff3d.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/6196-f660628335b3586a.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/3413-e66c42fd5f0c513e.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/6083-521cfa67b64fd3da.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/app/(home)/page-8ac94ff8a414a40e.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/7c44c676.714ecb4f15917997.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/85582243-2b444d3765b18e68.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/7553-2fbe606b1d890b37.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/4281-e485bf3616a1e12b.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/784-8ebff4b4a1b7b9a5.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/3274-0274dce9ee05c9b4.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/8552-62047dd262ddbeb4.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/661-1a5ea4a9a95087fa.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/5335-fdba74e101f5015c.js
Auto-extracted from scan
TRACK
www.intercom.com/_next/static/chunks/app/suite/page-294929dba32a0c1a.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Intercom is a publicly traded company (NYSE: AI, as of 2025 rebranding) headquartered in San Francisco with a valuation exceeding $1 billion. It integrates deeply with CRM platforms (Salesforce, HubSpot), analytics tools (Segment, Amplitude), and marketing automation systems (Marketo, Pardot). Its chat widget frequently co-deploys alongside Google Analytics, Segment, and various ABM platforms, creating a layered tracking environment. Intercom's product suite spans live chat, email campaigns, product tours, and a customer data platform — each adding scripts and data collection endpoints to host sites.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

144 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details