This weakness occurs when a system's documentation fails to completely list all the ways its behavior can be controlled or changed during execution.
For developers and administrators, incomplete documentation creates hidden risks. Without a full list of control mechanisms, you might miss critical security settings, deploy the software incorrectly, or be unable to reproduce or debug issues. This gap turns routine configuration and troubleshooting into a guessing game, potentially leading to insecure defaults, operational failures, or unintended exposure. Common undocumented controls include environment variables, configuration files, registry keys, command-line arguments, and system-level settings. Attackers can exploit these hidden knobs to bypass security, escalate privileges, or cause instability. Thorough documentation of all execution controls is therefore a foundational security practice, not just a convenience.