All Vendors
session_replay
VWO

VWO

VWO triggers 9 BTI behavioral codes — the highest count in this analysis batch — combining session replay, behavioral biometrics, fingerprinting, and identity resolution into a surveillance stack that fires pre-consent on 47% of deployments.

64 IOCs47 detections47% pre-consent29 sites
90
Vendor Risk Score

How This Briefing Works

This report opens with key findings, then maps the gaps between what VWO discloses and what BLACKOUT observed at runtime. From there: what it means for your organization, what to do about it, and the detection data and evidence underneath.

Key Findings

Key Findings

47 detections across 29 sites47% pre-consent activity
HIGH

Pre-Consent Activity

VWO was observed loading and executing before user consent was obtained on 47% of sites where it was detected.

GDPRePrivacy
HIGH

Pending Analysis

9 BTI behavioral codes detected across 47 instances on 29 sites. Full claims extraction required for gap analysis.

Disclosure Gaps

Claims vs. Observed Behavior

1 gaps
1 HIGH

Pending Analysis

HIGH
They Claim

Claims analysis pending

Observed Behavior

9 BTI behavioral codes detected across 47 instances on 29 sites. Full claims extraction required for gap analysis.

Customer Impact

What This Means For You

If you deploy VWO, your visitors' entire session experience is captured — every keystroke pattern, mouse movement, click, scroll, and form interaction. With 47% pre-consent firing, nearly half of your visitor sessions begin recording before consent is obtained. The 9-cookie persistence architecture means VWO maintains tracking across sessions and devices, building longitudinal behavioral profiles of your visitors. You are the data controller for all of this processing. Your privacy policy likely describes VWO as an "optimization tool" — it is functionally a behavioral surveillance platform with identity resolution capabilities.
Recommended Actions

What To Do About It

Role-specific actions based on observed behavior

If You Use VWO

  • Immediately audit whether VWO session recordings capture sensitive form fields (passwords, payment data, health information)
  • Verify your CMP blocks ALL VWO scripts and cookies until explicit consent for session recording and behavioral biometrics
  • Update your privacy policy to specifically disclose session recording, behavioral biometrics, and identity resolution
  • Review VWO's data retention settings and enforce minimum retention periods

If You're Evaluating VWO

  • Conduct a DPIA specifically for VWO's behavioral biometrics (C06) and session recording (C07) capabilities
  • Assess whether VWO's 8-domain infrastructure triggers cross-border data transfer obligations
  • Evaluate server-side A/B testing alternatives that do not require client-side behavioral capture
  • Request VWO's SOC 2 report and verify data isolation between customers

Negotiation Leverage

  • 9 BTI behavioral codes detected — the most extensive behavioral footprint in this analysis batch. Demand a complete technical disclosure of all data collection capabilities
  • 47% pre-consent firing rate across 29 sites demonstrates systemic consent bypass, not isolated misconfiguration
  • Behavioral biometrics (C06) + session recording (C07) = sensitive personal data processing that likely triggers DPIA requirements under GDPR Article 35
  • 9 cookies and 8 domains represent an unusually large persistence footprint for an optimization tool — demand justification for each cookie and domain
  • Identity resolution (C14) transforms a testing tool into a surveillance platform — require contractual prohibition on using your visitor data for cross-customer profiling
Runtime Detections

Runtime Detections

9 BTI-C CODES

BLACKOUT observed this vendor's JavaScript executing in a live browser and classified each hostile behavior using our BTI-C (Behavioral Threat Intelligence — Capability) taxonomy. These are not theoretical risks — each code below was triggered by something we watched this vendor's code actually do.

BTI-C01Defeat Device

Evasion infrastructure, auditor bypass

Impact: Evasion infrastructure means VWO can alter its behavior during compliance audits, making it impossible to verify through standard testing what data is collected during normal visitor sessions.

BTI-C06Behavioral Biometrics

Keystroke/mouse tracking

Impact: Keystroke dynamics and mouse movement tracking captures unique behavioral signatures of your visitors. This biometric data is classified as sensitive personal data under multiple privacy frameworks and requires explicit consent with specific purpose limitation.

BTI-C07Session Recording

Full session replay

Impact: Full session replay means every click, scroll, and form interaction on your site is captured and transmitted to VWO servers. Visitors typing passwords, credit card numbers, or health information have no visibility into this recording.

BTI-C08Cross-Domain Sync

Identity stitching

Impact: Identity stitching across 8 domains means VWO correlates visitor behavior across multiple properties, building behavioral profiles that extend beyond your site and beyond your data processing disclosures.

BTI-C09Consent Bypass

Ignoring CMP signals

Impact: VWO fires before consent on 47% of observed deployments. Every pre-consent session recording and biometric capture is a separate GDPR violation with potential fines up to 4% of annual turnover.

BTI-C10Fingerprinting

Device identification

Impact: Device fingerprinting creates persistent visitor identifiers that survive cookie clearing, undermining the right to withdraw consent and creating compliance gaps with ePrivacy regulations.

BTI-C13Persistence Mechanisms

Long-lived identifiers

Impact: Long-lived identifiers across 9 cookies ensure visitor tracking persists beyond reasonable session boundaries. Combined with fingerprinting, this creates a dual-layer persistence architecture that is extremely difficult for visitors to escape.

BTI-C14Identity Resolution

PII deanonymization

Impact: PII deanonymization transforms VWO from a testing tool into an identification system. Anonymous visitors can be resolved to real identities, creating data processing that most privacy policies do not disclose.

BTI-C15Tag Manager

Container/loader (neutral)

Impact: Tag management capabilities mean VWO can dynamically load additional scripts and trackers, expanding the data collection surface beyond what was initially deployed or audited.

IOC Manifest

IOC Manifest

60 INDICATORS

Indicators of compromise across 6 categories. Use for detection rules, CSP policies, or Pi-hole blocklists.

TRACK
*vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_*.js*
Tracking script
TRACK
*vwo.com/wp-content/themes/vwo/js/vendor/waypoints.js*
Tracking script
TRACK
*research.vwo.com/js/forms2/js/forms2.js*
Tracking script
TRACK
*vwo.com/bd_list.json*
Tracking script
TRACK
*research.vwo.com/index.php/form/getForm*
Tracking script
TRACK
*vwo.com/wp-content/themes/vwo/images/new-website/vwo-ai-capabilities/work-smarter-2.1.json*
Tracking script
TRACK
*vwo.com/wp-content/themes/vwo/images/new-website/vwo-ai-capabilities/work-smarter-1.1.json*
Tracking script
TRACK
*vwo.com/wp-content/themes/vwo/images/new-website/vwo-ai-capabilities/work-smarter-3.1.json*
Tracking script
TRACK
*vwo.com/wp-content/plugins/vwo-common-templates/intl-tell/js/utils.js*
Tracking script
TRACK
dev.visualwebsiteoptimizer.com
Tracking script
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_c6a55456af4776c733018888483aba22.js
Auto-extracted from scan
TRACK
research.vwo.com/js/forms2/js/forms2.min.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_304fd509939802b85c4ffe9d58f3498f.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_ca8944935da44cd3e748bb472f73cabb.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_ac550726469b6bef3bd4a20c327d587d.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_ee18802f49eae0c80912bf8349fd5272.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_ec3237e6283d9cab36a554f251d85964.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_196f6e53ea1c2490bced0da473e9ff3f.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_e78720f8fc3159a0c2c097aacc253516.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_483a3731bbe7046c1da3163da76dbe98.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_bb3fd7d1efd268d2b46e0409d7807710.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/themes/vwo/js/vendor/waypoints.min.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_10259c5e6865e68f5e43be67aa5fcc17.js
Auto-extracted from scan
TRACK
vwo.com/wp-content/cache/autoptimize/1/js/autoptimize_single_51c4896be33acb79ff28de4e57093208.js
Auto-extracted from scan
TRACK
research.vwo.com/index.php/form/getForm
Auto-extracted from scan
TRACK
vwo.com/wp-content/plugins/vwo-common-templates/intl-tell/js/utils.js
Auto-extracted from scan
Ecosystem

Ecosystem & Supply Chain

VWO (Wingify) is an India-based SaaS company operating in the conversion rate optimization space. The platform integrates with major analytics providers (Google Analytics, Adobe Analytics), CRM systems (Salesforce, HubSpot), and CDP platforms. Its 8-domain IOC footprint suggests a distributed infrastructure spanning content delivery, data collection, and identity services. VWO competes with Optimizely, AB Tasty, and Dynamic Yield, but its 9 BTI-C code profile places it at the extreme end of behavioral data collection in the optimization category. The tag manager capability (C15) means VWO can serve as a loader for additional third-party scripts.
Evidence

Evidence Artifacts

Artifacts collected during analysis, available with evidence-tier access.

HAR Capture

Complete network capture with all requests and responses

IOC Manifest

64 detection signatures across scripts, domains, cookies, and network endpoints

Vendor Details