How This Briefing Works
This report opens with key findings, then maps the gaps between what Snowflake discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Pre-Consent Activity
Snowflake was observed loading and executing before user consent was obtained on 100% of sites where it was detected.
Claims vs. Observed Behavior
pending
“Unknown”
Requires claims extraction via CDT
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
If You Use Snowflake
- →Audit Data Marketplace participation - verify your customer data is not syndicated to any external organizations
- →Review Data Clean Room agreements - confirm no competitive intelligence sharing occurs
- →Implement data retention limits - Snowflake enables indefinite storage creating unlimited GDPR liability
- →Verify consent architecture - behavioral events must not flow to warehouse before explicit opt-in
If You're Evaluating Snowflake
- →On-premise data warehousing with no cross-organization sharing capabilities
- →Cloud warehousing with contractual Data Marketplace exclusion
- →First-party CDP with explicit data sharing controls and retention limits
Negotiation Leverage
- →Perfect CAC subsidization (100) reflects Data Marketplace architecture - demand contractual exclusion from ALL data syndication
- →Perfect legal tail risk (100) indicates consent bypass for cross-org sharing - DPA must include unlimited indemnification
- →Data Clean Rooms enable competitive intelligence masquerading as privacy tech - verify no competitor data matching occurs
- →Indefinite retention via warehousing violates GDPR Article 5 - confirm automated deletion schedules
- →Platform monetizes cross-organization data sharing - pricing should reflect opt-out from Marketplace participation
- →Snowflake infrastructure enables privacy violations at scale - standard DPA terms are inadequate
Runtime Detections
BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.
Evasion infrastructure, auditor bypass
Keystroke/mouse tracking
Full session replay
Identity stitching
Impact: Data Clean Rooms enable cross-organization customer matching without user knowledge. Constitutes large-scale profiling under GDPR Article 35 requiring DPIA.
Ignoring CMP signals
Impact: Behavioral event collection flows to Snowflake before consent mechanisms. Data syndication via Marketplace occurs without customer notification. Creates strict liability under Article 6.
Device identification
Container/loader (neutral)
Impact: Snowflake data warehousing enables indefinite retention of behavioral data without consent expiration. Creates unlimited liability accumulation and violates GDPR Article 5(1)(e) storage limitation.
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
218 detection signatures across scripts, domains, cookies, and network endpoints