Framework
Manipulation Matrix
25 techniques organized across 5 behavioral domains. Each cell links to the full technique definition.
Critical
High
Medium
FIN
Financial Manipulation
AUTH
Authorization Manipulation
AUD
Audit Manipulation
DATA
Data Manipulation
XSYS
Cross-System Manipulation
ICMF-FIN-001
Hidden Financial Adjustment
ICMF-AUTH-001
Shadow Mode Backdoor
ICMF-AUD-001
Audit Log Tampering
ICMF-FIN-002
Financial Rounding Manipulation
ICMF-AUTH-002
Preferred User Bypass
ICMF-AUD-002
Log Suppression Branch
ICMF-FIN-003
Discount Threshold Bypass
ICMF-AUTH-003
Approval Chain Short-Circuit
ICMF-AUD-003
Audit Trail Deletion
ICMF-FIN-004
Ledger Posting Redirection
ICMF-AUTH-004
Conditional Role Elevation
ICMF-AUD-004
Misleading Audit Substitution
ICMF-FIN-005
Payment Release Bypass
ICMF-AUTH-005
Permission Scope Expansion
ICMF-AUD-005
Out-of-Band State Change
25Techniques
7Critical
15High
5Domains