Executive Summary
Vector is a Y Combinator-backed B2B "contact-level advertising" platform that de-anonymizes website visitors and matches them to verified contacts for targeted advertising across LinkedIn, Google, and Meta. Despite claiming GDPR/CCPA compliance, runtime analysis shows 62.3% of Vector deployments fire before consent. The platform uses a multi-step "identity waterfall" including IP enrichment via undisclosed third-party pro.ip-api.com. A Q4 2025 penetration test by Oneleet revealed critical vulnerabilities including mass assignment flaws allowing cross-customer data exposure. Vector operates 21 third-party tracking vendors on their own website pre-consent while only disclosing three.
Revenue Threat Profile
4 COLLAPSE VECTORSHow this vendor creates financial exposure. Each score (0-100) reflects observed runtime behavior and documented business practices.
CAC Subsidization
Vector corrupts attribution by inserting itself into the measurement chain. Their contact-level targeting creates attribution loops where Vector-identified contacts are served ads, then Vector claims conversion credit. This pollutes marketing analytics with circular attribution that cannot be independently verified.
Signal Corruption
Vector explicitly collects demand signals (which contacts are visiting which pages) and uses them for competitive advertising. When a prospect visits your site, Vector can identify them and help competitors target them. Their 'identity waterfall' creates a shared pool of visitor intelligence that benefits all Vector customers, including your competitors.
Legal Tail Risk
The Q4 2025 Oneleet pentest revealed critical security vulnerabilities: mass assignment allowing cross-customer webhook hijacking (VCTR-001), subscription bypass (VCTR-002), and exposed API keys (VCTR-003). Their pixel shares visitor IP addresses with third-party ip-api.com without disclosure. The 5,413-line pixel.js introduces significant attack surface to any site deploying it.
GTM Attack Surface
Vector claims GDPR and CCPA compliance while exhibiting 62.3% pre-consent tracking. They claim to be 'SOC2 ready' but have not completed audit. Their privacy policy mentions only 3 vendors while they deploy 21 pre-consent on their own site. The identity waterfall performs aggressive visitor identification that likely requires explicit consent under GDPR Article 6.