How This Briefing Works
This report opens with key findings, then maps the gaps between what MadKudu discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
pending
“Awaiting scanner verification”
MadKudu Tag runtime behavior, cookie patterns, and pre-consent execution timing require direct observation via BLACKOUT scanner
pending
“HG Insights data sharing scope unknown”
Post-acquisition data flow between MadKudu scoring models and HG Insights technology intelligence products needs verification
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for MadKudu
- →Audit your privacy policy to confirm MadKudu is disclosed as a data processor. Review whether the MadKudu Tag loads before or after consent is granted. Map all data sources feeding into MadKudu (Segment, CRM, product analytics) and assess whether visitors are informed about cross-source profiling. Evaluate whether predictive scoring constitutes automated decision-making requiring GDPR Article 22 protections. Request a data processing agreement that specifies retention periods for behavioral data and scoring models. Confirm the HG Insights acquisition has not changed data sharing terms.
Negotiation Leverage
- →MadKudu's leverage point is its position as middleware: it processes data collected by other tools you already run. When negotiating, demand clear data flow documentation showing exactly which upstream sources feed scoring models. Require contractual guarantees that the HG Insights acquisition does not expand data sharing beyond original DPA terms. Push for consent-gated tag loading as a deployment requirement. The platform's value depends on data volume -- restricting input sources to only consent-verified data significantly impacts model accuracy, giving you leverage to negotiate better privacy terms in exchange for maintaining data access.
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
42 detection signatures across scripts, domains, cookies, and network endpoints