How This Briefing Works
This report opens with key findings, then maps the gaps between what Supermetrics discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.
Key Findings
Analysis pending. Findings will appear here once intelligence collection is complete.
Claims vs. Observed Behavior
Pending Analysis
“Claims extraction pending”
Awaiting contextual analysis
What This Means For You
What To Do About It
Role-specific actions based on observed behavior
Recommended Actions for Supermetrics
- →- Audit which OAuth tokens and API permissions Supermetrics holds across your marketing platform portfolio, and implement least-privilege access where possible. - Review Supermetrics Data Blending templates for attribution double-counting: verify that cross-platform blended reports deduplicate conversions rather than summing platform-native attribution claims. - Assess the compliance implications of Supermetrics' data controller status and ensure your privacy documentation covers the data sharing arrangement. - Request documentation on Supermetrics' temporary storage purge schedules and data retention practices for each connected data source. - Evaluate whether Supermetrics Storage (BigQuery-based) aligns with your data residency and governance requirements.
Negotiation Leverage
- →Supermetrics' data controller status is the primary leverage point in negotiations. Most marketing data tools operate as data processors, which places the customer in control. Supermetrics' controller arrangement gives them independent rights over the marketing data flowing through their platform. Demand clarification on what Supermetrics does with marketing data beyond customer-directed queries, and negotiate processor status if possible.
- →Key questions: What marketing data does Supermetrics retain after temporary storage purge cycles? How are OAuth tokens secured, and what is the breach notification process if token storage is compromised? Does Supermetrics use aggregated customer data for product improvement, benchmarking, or any purpose beyond direct service delivery? If Supermetrics processes 15% of global ad spend, what data isolation guarantees exist between customers? These questions test the gap between Supermetrics' security marketing and the reality of operating a centralized marketing data hub at massive scale.
IOC Manifest
Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.
Ecosystem & Supply Chain
Evidence Artifacts
Artifacts collected during analysis, available with evidence-tier access.
Complete network capture with all requests and responses
92 detection signatures across scripts, domains, cookies, and network endpoints