How This Briefing Works
This report opens with key findings, then maps the gaps between what LeanData discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“Operates within Salesforce environment”
Awaiting scanner verification to confirm whether LeanData deploys any client-side scripts on customer web properties or operates entirely within the CRM/server-side environment
pending
“Data hygiene and deduplication”
The impact of LeanData's deduplication logic on data integrity and record survival decisions needs evaluation — which records are merged or deleted affects downstream analytics
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for LeanData
- →- Document routing logic externally: Maintain an independent record of all routing rules, territory assignments, and matching criteria outside of LeanData to reduce vendor lock-in risk. - Audit matching accuracy: Regularly sample lead-to-account matches to verify fuzzy matching accuracy and identify systematic errors that could distort pipeline metrics. - Review DPA scope: Ensure your Data Processing Agreement with LeanData explicitly covers the personal data flowing through matching and routing operations, including any enrichment data processed during the matching workflow. - Assess operational continuity: Develop a contingency plan for routing operations if LeanData experiences an outage, including manual routing procedures and escalation paths. - Evaluate data portability: Confirm you can export all routing rules, matching configurations, and operational logic in a format that can be reconstructed in an alternative system.
Negotiation Leverage
- →LeanData's leverage comes from the switching cost — once routing logic is embedded in LeanData, migrating to an alternative requires reconstructing every routing rule, matching configuration, and workflow trigger. Counter this by negotiating strong data portability commitments upfront: full export of all routing configurations in a documented, portable format. Push for operational intelligence restrictions — contractual commitments that LeanData will not use your routing patterns, territory designs, or process architecture to inform product development or benchmark offerings to other customers. Demand SLA commitments with financial penalties tied to matching accuracy rates and routing uptime, given the direct revenue impact of failures. Your leverage is the depth of integration — LeanData wants deep operational embedding because it creates retention, which means you can demand proportionally strong contractual protections.
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
100 detection signatures across scripts, domains, cookies, and network endpoints