What does Vakteye actually test?
Vakteye runs a suite of scanners against your site to surface compliance and security issues. The compliance set covers cookie-consent enforcement (banner detection, reject-button function, tracker-after-rejection monitoring, Google Consent Mode v2 signal validation, TCF v2.2 decoding, geo-aware scans), third-party data flow, data-residency claims, accessibility (axe-core WCAG 2.1 AA), policy presence, and form-leakage. The security set covers Nuclei-based CVE/misconfig templates, ZAP passive checks, hardcoded secret detection (regex + gitleaks 8.30.1), Retire.js library vulnerabilities with OSV enrichment, and exposure checks. Findings are mapped to GDPR, ePrivacy, LEK, NIS2 and Cybersäkerhetslagen articles.
Is Vakteye legal to run on a website I do not own?
Run Vakteye only against sites you own or are authorised to test. Vakteye operates a public scanner-disclosure page at vakteye.com/audit explaining who we are, our User-Agent (Vakteye/1.0), and our two egress IP addresses in Frankfurt, Germany. Site operators can opt out at vakteye.com/audit/opt-out — a verified, single-use email-token form that adds the domain to a server-enforced exclusion list. We honour robots.txt at scan time. The compliance-mode scanner relies on GDPR Article 6(1)(f) legitimate interest for outbound non-intrusive scanning of publicly reachable URLs; full-mode, EASM and pentest scans run only under a signed customer agreement.
Does Vakteye replace my consent management platform?
No. Vakteye is an independent auditor, not a CMP. We test whether the CMP you have deployed (OneTrust, Cookiebot, TrustArc, Usercentrics, Iubenda, your own implementation) actually behaves as it claims when a real visitor clicks Reject. Vakteye and your CMP are complementary: the CMP collects and signals consent; Vakteye verifies that the signals are honoured downstream and that no tracker fires before consent.
What evidence does a Vakteye report contain?
Each scan produces a verified findings list with confidence labels (Certain, Firm, Tentative), citations to the relevant article in the legal RAG corpus (1,662 chunks across 14 frameworks including GDPR, ePrivacy, NIS2, Cybersäkerhetslagen, LEK, EDPB guidelines, CJEU case law), and forensic artefacts: a Playwright trace replay (.zip), HAR 1.2 recordings phase-marked across the consent flow, a smoking-gun timeline reconstructed from the HAR, and a SHA-256 manifested forensic-bundle download for approved review states. Findings can be downloaded as PDF or CSV.
How does Vakteye handle false positives?
Three layers. First, a pattern prefilter catches CERTAIN findings (proven by behavioural test or tracker-DB match) and auto-confirms them without LLM cost. Second, pattern-based verification sub-tasks run behavioural tests against tracker DBs and DOM checks. Third, a Claude-based verifier with multimodal screenshot input handles ambiguous cases. A second-pass auditor with tool use (DNS, HTTP HEAD, DOM-query, cross-finding query) re-investigates the final clustered findings. Reviewer corrections are recorded in scanner_human_feedback, and findings flagged false-positive twice are auto-downgraded on subsequent scans.