ICMF v1.0
Home Matrix Techniques Framework Whitepaper

Registry

Technique Registry

Full catalog of ICMF insider code manipulation techniques.

All Critical High Medium
All FIN AUTH AUD DATA XSYS
5 techniques
ID Technique Category Risk Evid.
ICMF-AUTH-001 Shadow Mode Backdoor AUTH Critical L3
ICMF-AUTH-002 Preferred User Bypass AUTH High L3
ICMF-AUTH-003 Approval Chain Short-Circuit AUTH High L3
ICMF-AUTH-004 Conditional Role Elevation AUTH High L2
ICMF-AUTH-005 Permission Scope Expansion AUTH High L2
ICMF · Insider Code Manipulation Framework v1.0
General Inquiries contact@icmf.dev
Security Issues security@icmf.dev
CC BY-NC 4.0 SecodX Research GitHub