All Vendors
cmp

TrustArc

TrustArc operates consent infrastructure while simultaneously enabling persistent tracking through behavioral biometrics, session recording, and cross-domain synchronization. The platform positions itself as a privacy compliance solution while deploying consent bypass mechanisms and identity resolution capabilities that undermine the very framework it purports to enforce.

83 IOCs13 detections69% pre-consent9 sites
80
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what TrustArc discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

13 detections across 9 sites69% pre-consent activity
CRITICAL

Pre-Consent Activity

TrustArc was observed loading and executing before user consent was obtained on 69% of sites where it was detected.

GDPRePrivacy
Disclosure Gaps

Claims vs. Observed Behavior

1 gaps

pending

UNKNOWN
They Claim

Requires claims extraction via CDT

Observed Behavior

Behavioral biometrics, session recording, cross-domain sync, consent bypass, and identity resolution detected in runtime

Customer Impact

What This Means For You

Marketing teams lose attribution visibility when consent workflows filter behavioral signals. Analytics teams face measurement distortion from consent layer interference. Legal teams inherit liability exposure when privacy compliance vendor itself violates consent principles. Revenue operations teams subsidize competitor intelligence through shared consent infrastructure that observes privacy strategies across customer base.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use TrustArc

  • Require consent infrastructure vendor to demonstrate zero tracking before consent collection
  • Audit behavioral biometrics deployment in privacy preference interfaces
  • Verify cross-domain sync scope does not extend consent decisions beyond intended boundaries
  • Review session recording retention for consent configuration workflows

If You're Evaluating TrustArc

  • Alternative consent management platforms that do not deploy persistent tracking mechanisms
  • Self-hosted consent solutions that prevent competitive intelligence leakage through shared infrastructure
  • Privacy-respecting analytics that do not corrupt measurement through consent layer manipulation

Negotiation Leverage

  • Challenge consent bypass mechanisms deployed by privacy compliance vendor itself
  • Require disclosure of all tracking active before consent collection completes
  • Demand opt-out from cross-customer behavioral analysis through consent workflow monitoring
  • Request data processing agreement amendments addressing vendor tracking through consent infrastructure
  • Negotiate liability indemnification for consent framework violations by consent infrastructure provider
Runtime Detections

Runtime Detections

5 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Keystroke dynamics and interaction patterns captured through consent interface enable user profiling based on how visitors engage with privacy controls themselves.

BTI-C07Session Recording

Full session replay

Impact: Privacy preference configuration sessions captured in full fidelity, exposing how users navigate consent choices and revealing hesitation patterns around data collection.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Consent decisions synchronized across organizational web properties create unified privacy preference profiles that persist beyond individual site contexts.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: Tracking mechanisms active before consent collection completes undermine the consent infrastructure the vendor exists to provide.

BTI-C14Identity Resolution

PII deanonymization

Impact: User recognition across privacy interactions enables tracking individuals through their consent management behavior patterns.

IOC Manifest

IOC Manifest

83 INDICATORS

Indicators of compromise across 4 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*consent.trustarc.com/autoblockoptout*
Tracking script
TRACK
*consent.trustarc.com/autoblockasset/core.min.*c2.js*
Tracking script
TRACK
*trustarc.com/wp-content/themes/trustarc/assets/dist/js/jquery-3.6.0.js*
Tracking script
TRACK
*trustarc.com/wp-content/themes/trustarc/assets/dist/js/app.js*
Tracking script
TRACK
*consent.trustarc.com/notice*
Tracking script
TRACK
*consent.trustarc.com/asset/notice.js/v/v1.7-14*
Tracking script
TRACK
*trustarc.com/wp-includes/js/wp-emoji-release.js*
Tracking script
TRACK
*info.trustarc.com/rs/846-LLZ-652/images/rwtsmin_minified.js*
Tracking script
TRACK
consent.trustarc.com
Tracking script
TRACK
trustarc.com/wp-content/themes/trustarc/assets/dist/js/jquery-3.6.0.min.js
Auto-extracted from scan
TRACK
consent.trustarc.com/autoblockasset/core.min.39652c2.js
Auto-extracted from scan
TRACK
consent.trustarc.com/autoblockoptout
Auto-extracted from scan
TRACK
consent.trustarc.com/notice
Auto-extracted from scan
TRACK
trustarc.com/wp-content/themes/trustarc/assets/dist/js/app.js
Auto-extracted from scan
TRACK
consent.trustarc.com/asset/notice.js/v/v1.7-14
Auto-extracted from scan
TRACK
trustarc.com/wp-includes/js/wp-emoji-release.min.js
Auto-extracted from scan
TRACK
info.trustarc.com/rs/846-LLZ-652/images/rwtsmin_minified.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

TrustArc consent infrastructure integrates with tag management platforms, creates persistent measurement interference through privacy layer positioning, and establishes consent workflow monitoring channels that observe competitive privacy strategies across shared customer base.
Loaded By (1)
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

83 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details