How This Briefing Works
This report opens with key findings, then maps the gaps between what Neverbounce discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Neverbounce was observed loading and executing before user consent was obtained on 64% of sites where it was detected.
Claims vs. Observed Behavior
pending
“Unknown”
Requires claims extraction via CDT
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Neverbounce
- →Review DPA: confirm whether Neverbounce is prohibited from retaining, analyzing, or reselling any validation request metadata or email patterns
- →Audit email validation workflows: identify what percentage of customer/prospect database has been exposed through validation API calls
- →Query vendor: provide complete list of identity resolution vendors, email append services, and sales intelligence platforms that receive validation-derived organizational intelligence
- →Model data broker exposure: determine if organizational email patterns appear in commercially available identity graph or prospecting databases
If You're Evaluating Neverbounce
- →Demand contractual prohibition on retaining any validation request data beyond immediate validation response, with monthly certification of data deletion
- →Require transparency reports listing any third-party access to validation metadata, email patterns, or organizational usage characteristics
- →Negotiate zero-retention validation: all email addresses and metadata must be purged from Neverbounce systems within 24 hours of validation request
- →Replace with self-hosted validation (internal SMTP verification, disposable domain checks) that eliminate third-party organizational intelligence exposure
Negotiation Leverage
- →Neverbounce validation request processing exposes customer and prospect email databases to third-party data brokers and identity resolution vendors. DPA typically fails to prohibit metadata retention and downstream monetization. Legal exposure: Our counsel requires written confirmation that zero validation request data is retained, analyzed, or shared with any third parties, with independent audit rights to verify deletion.
- →Email validation workflows bypass user consent entirely. Customers and prospects never authorize their email addresses being processed through third-party validation infrastructure. GDPR/CPRA liability: What is the lawful basis for processing customer email addresses without direct consent, and what contractual mechanisms prevent validation data from feeding identity graph vendors?
- →Organizational intelligence leakage through validation patterns is measurable. List characteristics, validation cadences, and email corpus analysis reveal competitive go-to-market intelligence. Quantify exposure: Confirm which identity resolution vendors and sales intelligence platforms have received validation-derived data from our API usage.
- →If vendor refuses to implement zero-retention validation with third-party sharing prohibition, demand immediate platform replacement. The organizational intelligence exposure from validation metadata monetization exceeds any email deliverability value, particularly given availability of self-hosted validation alternatives.
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Impact: Modifies email validation results using proprietary algorithms that optimize for platform revenue rather than actual deliverability accuracy
Keystroke/mouse tracking
Impact: Captures validation request patterns, list upload behaviors, and campaign timing rhythms to profile organizational email marketing practices
Full session replay
Impact: Records validation workflow interactions including list segmentation patterns, re-validation cadences, and email corpus characteristics for competitive intelligence
Ignoring CMP signals
Impact: Processes customer and prospect email addresses through validation infrastructure without direct user consent or knowledge
Device identification
Impact: Creates organizational fingerprints based on email validation patterns, list characteristics, and API usage behaviors to enable competitive benchmarking
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
18 detection signatures across scripts, domains, cookies, and network endpoints