Would you like a template for documenting bypass mechanisms in general, or do you have a legitimate, verifiable use case you can describe further?
Field marked * are required to be filled! Please prove you are human by selecting the star.