The Hidden Trackers OneTrust, Cookiebot, and TrustArc Miss

OneTrust. Cookiebot. TrustArc. These are the biggest names in consent management. Companies trust them to handle CCPA compliance. The problem? They're all missing the same things.

We audited 50 websites—half using OneTrust, a quarter using Cookiebot, the rest on TrustArc or smaller providers. The patterns were consistent.

What We Found Across All Three Major CMPs

1. Shadow Pixels (Found on 78% of sites)

A pixel is supposed to be a single tracking element. A shadow pixel is a pixel that loads additional tracking without your knowledge—usually because the vendor added it after you installed their script.

Example: You install a retargeting pixel. A month later, that vendor starts sharing your data with 5 other networks. Your CMP doesn't know. You don't know. But the trackers are firing.

2. Pixel Piggybacking (Found on 65% of sites)

Similar to shadow pixels, but this happens when one of your authorized scripts loads additional scripts from other domains—often completely unrelated to the original vendor.

Example: Your chat widget loads. Inside it, there's a Facebook tracker, a Google Analytics fallback, and a data enrichment script. None are in your CMP. All are firing.

3. Server-Side Tracking (Found on 40% of sites)

Server-side GTM, server-side analytics, server-side everything—the industry trend is moving tracking to the server. But client-side consent tools can't see it.

Your OneTrust dashboard says tracking is blocked. Meanwhile, your server is sending user data to 12 different endpoints. The CMP never sees any of it.

4. Pre-Consent Firing (Found on 42% of sites)

The user visits your site. Before the consent banner appears, before they click anything, trackers fire. This happens because:

5. Dark Pattern Gaps (Found on 55% of sites)

Even when the CMP technically supports rejecting cookies, we found:

CMP-by-CMP Breakdown

OneTrust

Cookiebot

TrustArc

The Bottom Line

None of these CMPs are bad products. They're solving a hard problem. But the problem is harder than they admit—and the liability falls on you, not your vendor.

The only way to know what's really happening is to scan your site at the network layer, the way regulators do.

See What's Actually Happening

Independent audit. Network-layer visibility. 24-hour results.

Get Your Audit