Registry
Technique Registry
Full catalog of ICMF insider code manipulation techniques.
| ID | Technique | Category | Risk | Evid. |
|---|---|---|---|---|
| ICMF-AUTH-001 | Shadow Mode Backdoor | AUTH | Critical | L3 |
| ICMF-AUTH-002 | Preferred User Bypass | AUTH | High | L3 |
| ICMF-AUTH-003 | Approval Chain Short-Circuit | AUTH | High | L3 |
| ICMF-AUTH-004 | Conditional Role Elevation | AUTH | High | L2 |
| ICMF-AUTH-005 | Permission Scope Expansion | AUTH | High | L2 |