This is a good question, I have seen no research on this subject. They might, because as far as I’ve seen the easiest way to detect meek (which is similar) is via timing attacks, which wouldn’t be possible if the load was spread out across many bridge operators, which is the goal of WebTunnel.
However, even if they aren’t easily detectable in real time, they run into this other problem bridges have (when they eventually are identified by IP):
That being said, if the fronting website that WebTunnel bridge operators run is convincing enough or a legitimate site which handles a lot of traffic, that could add plausible deniability and mitigate that concern too…
The challenge for them will be getting legitimate websites to run WebTunnel bridges.