ICMF v1.0
Home Matrix Techniques Framework Whitepaper

Registry

Technique Registry

Full catalog of ICMF insider code manipulation techniques.

All Critical High Medium
All FIN AUTH AUD DATA XSYS
15 techniques
ID Technique Category Risk Evid.
ICMF-FIN-001 Hidden Financial Adjustment FIN Critical L3
ICMF-FIN-002 Financial Rounding Manipulation FIN Critical L3
ICMF-FIN-003 Discount Threshold Bypass FIN Critical L3
ICMF-FIN-004 Ledger Posting Redirection FIN Critical L3
ICMF-FIN-005 Payment Release Bypass FIN Critical L3
ICMF-AUTH-001 Shadow Mode Backdoor AUTH Critical L3
ICMF-AUTH-002 Preferred User Bypass AUTH High L3
ICMF-AUTH-003 Approval Chain Short-Circuit AUTH High L3
ICMF-AUTH-004 Conditional Role Elevation AUTH High L2
ICMF-AUTH-005 Permission Scope Expansion AUTH High L2
ICMF-AUD-001 Audit Log Tampering AUD Critical L3
ICMF-AUD-002 Log Suppression Branch AUD High L3
ICMF-AUD-003 Audit Trail Deletion AUD Critical L4
ICMF-AUD-004 Misleading Audit Substitution AUD High L3
ICMF-AUD-005 Out-of-Band State Change AUD High L3
ICMF · Insider Code Manipulation Framework v1.0
General Inquiries contact@icmf.dev
Security Issues security@icmf.dev
CC BY-NC 4.0 SecodX Research GitHub