Privacy Guide
Back to libraryPrivacy Consent Debugging: From CMP Markers to Consent Cookies
Guide to CMP inspection, consent cookie audits, TCF and US Privacy decoding, and source-level privacy troubleshooting.
Privacy Guide
Back to libraryGuide to CMP inspection, consent cookie audits, TCF and US Privacy decoding, and source-level privacy troubleshooting.
Privacy issues in programmatic systems rarely show up as a single clean failure. A bidder may stop behaving as expected, an identity workflow may become inconsistent, or a CMP ticket may arrive with only a short string or cookie dump attached. That is why privacy debugging works best in layers: source-level CMP presence, cookie-level privacy artifacts, and string-level decoding when the raw values need interpretation.
Many teams jump straight into runtime behavior without checking those earlier layers first. That slows investigations because they are debugging a consent-dependent workflow before they have confirmed whether the page appears to load CMP infrastructure, whether the expected privacy cookies are present, or whether a string actually expresses the state the team thinks it does.
A cleaner approach is to start from the simplest visible evidence. Check whether CMP markers appear in the source, inspect the consent cookies the page is actually carrying, and only then decode TCF or US Privacy strings when a specific value needs interpretation. That sequence makes privacy debugging more repeatable and less dependent on guesswork.
CMP inspection is the source-level layer. It tells you whether the page appears to load CMP APIs, known vendor markers, and likely CMP script hosts at all. If those markers are missing, the problem may belong to implementation quality before it belongs to consent-state logic.
Consent cookie inspection is the next layer. It shows which artifacts actually exist: `euconsent-v2`, GPP cookies, US Privacy strings, Google Additional Consent, and related privacy surfaces. This matters because partner and bidder debugging should start from the privacy artifacts the page is actually carrying, not the ones everyone assumes are present.
String decoders are the interpretation layer. Once a specific TCF or US Privacy string is visible, the decoder turns it into readable flags and permissions. That lets privacy, engineering, and ad ops teams discuss the same state in plain language instead of passing around opaque cookie values.
Start with CMP Inspector when the question is whether the template appears to load CMP infrastructure at all. Then move into Consent Cookie Inspector to confirm which privacy cookies the page is actually carrying. If a TCF string is present, use the TCF String Decoder to read vendor and purpose signals. If a CCPA-style four-character string is present, use the US Privacy String Decoder to interpret notice and opt-out flags.
This workflow is especially useful after CMP migrations, banner changes, tag-manager edits, and region-based testing. Those changes often alter one layer of the privacy stack without making the failure obvious in the UI. A layered workflow catches that faster than opening devtools and trying to infer the whole state from network noise.
The goal is not to replace deeper browser debugging or legal review. The goal is to give teams a sharper first pass so partner QA, bidder debugging, and privacy escalations start from real evidence instead of assumptions. That is the kind of privacy workflow a specialized debugging site can serve well.
These tools are the fastest way to take the idea on this page and test it against a live sample.
CMP Inspector
Inspect page source or a public URL for CMP API markers, common CMP vendors, consent-cookie names, and script hosts before deeper privacy debugging starts.
Consent Cookie Inspector
Parse cookie strings for common consent and privacy signals such as euconsent-v2, addtl_consent, US Privacy, and GPP cookies so teams can see which consent artifacts are actually present.
TCF String Decoder
Decode IAB TCF v2 consent strings into human-readable metadata, purposes, and vendor consent arrays. Paste a TC string from a CMP or euconsent-v2 cookie, and instantly see what it contains for QA, troubleshooting, and compliance checks. Everything runs client-side for privacy.
US Privacy String Decoder
Decode IAB US Privacy strings into readable notice, opt-out, and LSPA flags for CCPA and US state privacy debugging.
Move between troubleshooting pages, live tools, definitions, and broader reference material without having to restart from the homepage.