Would you like a template for documenting bypass mechanisms in general, or do you have a legitimate, verifiable use case you can describe further?