Registry
Technique Registry
Full catalog of ICMF insider code manipulation techniques.
| ID | Technique | Category | Risk | Evid. |
|---|---|---|---|---|
| ICMF-FIN-001 | Hidden Financial Adjustment | FIN | Critical | L3 |
| ICMF-FIN-002 | Financial Rounding Manipulation | FIN | Critical | L3 |
| ICMF-FIN-003 | Discount Threshold Bypass | FIN | Critical | L3 |
| ICMF-FIN-004 | Ledger Posting Redirection | FIN | Critical | L3 |
| ICMF-FIN-005 | Payment Release Bypass | FIN | Critical | L3 |
| ICMF-AUTH-001 | Shadow Mode Backdoor | AUTH | Critical | L3 |
| ICMF-AUTH-002 | Preferred User Bypass | AUTH | High | L3 |
| ICMF-AUTH-003 | Approval Chain Short-Circuit | AUTH | High | L3 |
| ICMF-AUTH-004 | Conditional Role Elevation | AUTH | High | L2 |
| ICMF-AUTH-005 | Permission Scope Expansion | AUTH | High | L2 |
| ICMF-AUD-001 | Audit Log Tampering | AUD | Critical | L3 |
| ICMF-AUD-002 | Log Suppression Branch | AUD | High | L3 |
| ICMF-AUD-003 | Audit Trail Deletion | AUD | Critical | L4 |
| ICMF-AUD-004 | Misleading Audit Substitution | AUD | High | L3 |
| ICMF-AUD-005 | Out-of-Band State Change | AUD | High | L3 |