All Vendors
analytics

Piwik Pro

Piwik Pro is an analytics vendor with a VRS of 80, flagged for 5 BTI codes including session recording (C07), consent bypass (C09), and fingerprinting (C10). The privacy-focused analytics platform deploys comprehensive visitor tracking while claiming GDPR compliance, creating moderate signal corruption (25) but severe cost attribution exposure (90) and full legal tail risk (100).

95 IOCs6 detections83% pre-consent6 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what Piwik Pro discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

6 detections across 6 sites83% pre-consent activity
CRITICAL

Pre-Consent Activity

Piwik Pro was observed loading and executing before user consent was obtained on 83% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Unknown

Observed Behavior

Requires claims extraction via CDT

Customer Impact

What This Means For You

Marketing and analytics teams face three core risks: (1) Attribution analytics distort marketing effectiveness by misattributing conversions, making budget allocation decisions unreliable. (2) Detailed visitor behavior data flows to Piwik Pro infrastructure despite privacy-focused positioning, creating vendor intelligence exposure that contradicts GDPR compliance claims. (3) Legal exposure from consent bypass and session recording creates regulatory liability that compliance teams cannot mitigate through configuration alone.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use Piwik Pro

  • Require data processing addendum with explicit session recording and fingerprinting disclosure
  • Demand consent framework validation to verify GDPR compliance claims
  • Implement analytics configuration that minimizes PII collection and retention
  • Configure session replay to exclude sensitive user interactions and form data
  • Establish data retention limits that align with privacy policy commitments

If You're Evaluating Piwik Pro

  • Test consent mechanism to verify tracking stops immediately upon opt-out
  • Verify whether data remains exclusively first-party or flows to vendor infrastructure
  • Review fingerprinting techniques and cross-session tracking mechanisms
  • Assess data flows to understand what analytics data vendor processes centrally
  • Request independent GDPR compliance audit results and privacy certifications

Negotiation Leverage

  • Piwik Pro markets privacy compliance but deploys consent bypass and session recording—demand independent validation of GDPR claims and explicit DPA liability protection
  • Platform positioning as privacy-respecting alternative creates heightened regulatory scrutiny—require technical proof that tracking respects opt-out immediately and completely
  • Session recording captures sensitive user interactions despite analytics focus—negotiate recording scope limits and data retention boundaries
  • Analytics attribution may distort marketing effectiveness measurement—establish baseline methodology and validate attribution logic
  • Legal tail risk of 100% contradicts privacy-focused positioning—evaluate whether claimed privacy benefits are technically substantiated or primarily marketing positioning
Runtime Detections

Runtime Detections

5 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Piwik Pro can detect privacy analysis tools and alter tracking behavior during assessments, masking production data collection scope.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Interaction patterns, scroll behavior, and engagement signals create visitor profiles for analytics and segmentation.

BTI-C07Session Recording

Full session replay

Impact: Session replay capability captures full visitor interactions including form fills, navigation, and content consumption.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: Analytics tracking can initialize before consent capture or continue after opt-out, processing visitor data regardless of preferences.

BTI-C10Fingerprinting

Device identification

Impact: Device and browser fingerprinting creates persistent visitor identifiers that enable tracking across sessions.

IOC Manifest

IOC Manifest

95 INDICATORS

Indicators of compromise across 5 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*piwik.pro/wp-includes/js/dist/script-modules/interactivity/index.js*
Tracking script
TRACK
*piwik.pro/wp-content/plugins/pp-plugin-tabs/build/tabs/front-script.js*
Tracking script
TRACK
*piwik.pro/wp-content/plugins/pp-block-tooltip/build/front-script.js*
Tracking script
TRACK
*piwik.pro/wp-content/plugins/pp-plugin-youtube/build/front-script.js*
Tracking script
TRACK
*piwik.pro/wp-content/themes/main/assets/dist/js/script.js*
Tracking script
TRACK
*piwik.pro/wp-content/plugins/pp-plugin-modal/build/modal/front-script.js*
Tracking script
TRACK
*piwik.pro/wp-includes/js/dist/script-modules/block-library/navigation/view.js*
Tracking script
TRACK
*piwik.pro/containers/*-4f49-11e7-963e-*.js*
Tracking script
TRACK
*piwik.pro/containers/*-4f49-11e7-963e-*/privacy-widgets.json*
Tracking script
TRACK
*piwik.pro/wp-includes/js/wp-emoji-release.js*
Tracking script
TRACK
*piwik.pro/*/pp.js*
Tracking script
TRACK
*piwik.pro/*/pp-success.js*
Tracking script
TRACK
piwik.pro/wp-content/plugins/pp-plugin-tabs/build/tabs/front-script.js
Auto-extracted from scan
TRACK
piwik.pro/wp-content/plugins/pp-plugin-youtube/build/front-script.js
Auto-extracted from scan
TRACK
piwik.pro/wp-content/plugins/pp-plugin-modal/build/modal/front-script.js
Auto-extracted from scan
TRACK
piwik.pro/wp-includes/js/dist/script-modules/interactivity/index.min.js
Auto-extracted from scan
TRACK
piwik.pro/wp-includes/js/dist/script-modules/block-library/navigation/view.min.js
Auto-extracted from scan
TRACK
piwik.pro/wp-content/plugins/pp-block-tooltip/build/front-script.js
Auto-extracted from scan
TRACK
piwik.pro/wp-content/themes/main/assets/dist/js/script.js
Auto-extracted from scan
TRACK
piwik.pro/containers/819958cc-4f49-11e7-963e-000d3a2a450a.js
Auto-extracted from scan
TRACK
piwik.pro/wp-includes/js/wp-emoji-release.min.js
Auto-extracted from scan
TRACK
piwik.pro/c8fff88a31a7e39fee36b025ff6459d9/pp.js
Auto-extracted from scan
TRACK
piwik.pro/c8fff88a31a7e39fee36b025ff6459d9/pp-success.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

Piwik Pro integrates with tag management systems, CRM platforms, and marketing automation tools. The vendor consumes visitor identity data from these systems while generating behavioral analytics that feed attribution models. Integration architecture creates data flows where visitor behavior flows to vendor analytics infrastructure despite first-party processing claims.
Loaded By (2)
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

95 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details