How This Briefing Works
This report opens with key findings, then maps the gaps between what Navattic discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Navattic was observed loading and executing before user consent was obtained on 73% of sites where it was detected.
Claims vs. Observed Behavior
pending
“Unknown”
Requires claims extraction via CDT
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Navattic
- →Audit privacy policy against demo environment surveillance reality (C06, C07, C10) and prospect data processing disclosures
- →Query vendor: provide complete list of sales intelligence platforms and intent data vendors receiving prospect behavioral data from demo sessions
- →Model competitive intelligence leakage: identify which rival vendors purchase intent data products that include Navattic-sourced demo engagement signals
- →Review DPA: confirm whether prospect demo behavioral data is included in prohibited third-party sharing categories
If You're Evaluating Navattic
- →Demand contractual prohibition on sharing prospect demo behavioral data with any intent data vendors, sales intelligence platforms, or competitive analysis services
- →Require monthly transparency reports listing all third-party consumers of demo engagement data and prospect behavioral intelligence
- →Negotiate data deletion guarantees: all prospect behavioral profiles must be purged immediately upon demo session completion or CRM opportunity close
- →Replace with self-hosted demo infrastructure (internal staging environments, video walkthroughs) that eliminate third-party prospect intelligence exfiltration
Negotiation Leverage
- →Navattic demo environment tracking constitutes prospect behavioral surveillance requiring explicit opt-in consent under GDPR and state privacy laws. Session recording (C07) and behavioral biometrics (C06) likely violate reasonable privacy expectations. Legal exposure: Our counsel requires written confirmation that prospect demo interactions receive same privacy protections as customer data, with specific guarantees against intent data vendor sharing.
- →Competitive intelligence leakage through intent data partnerships is measurable and permanent. Your platform feeds prospect product evaluation signals to rival vendors. Quantify impact: Provide complete list of intent data vendors and sales intelligence platforms that receive prospect behavioral data from our demo environments, and confirm which competing vendors subscribe to these services.
- →CAC inflation from intent data monetization is structural. We pay for demo infrastructure while competitors purchase our prospect behavioral intelligence through intent vendor partnerships. Demand transparency: What percentage of Navattic revenue derives from prospect data monetization vs. SaaS subscription fees?
- →If vendor refuses to eliminate intent data sharing, demand complete platform replacement. The competitive intelligence risk from systematic prospect behavioral exfiltration exceeds any sales enablement value, particularly when prospects reasonably expect evaluation privacy within demo environments.
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Impact: Modifies demo interaction flows and feature presentations to optimize for conversion metrics rather than authentic product experience representation
Keystroke/mouse tracking
Impact: Captures prospect interaction patterns, click sequences, and engagement rhythms within demo environments to build behavioral profiles for sales intelligence
Full session replay
Impact: Records complete demo sessions including feature exploration paths, workflow attempts, and engagement timelines for behavioral analysis and prospect scoring
Identity stitching
Impact: Synchronizes prospect behavioral data from demo environments with sales intelligence platforms and marketing automation systems across organizational properties
Ignoring CMP signals
Impact: Initializes tracking infrastructure before demo environments load consent disclosures, capturing prospect behavioral data regardless of privacy preferences
Device identification
Impact: Creates persistent prospect fingerprints that enable cross-session tracking to monitor evaluation progression and competitive product demo visits
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
269 detection signatures across scripts, domains, cookies, and network endpoints