I'm not claiming that this has already happened. My question is, how can I make sure that there is not an undocumented CPU instruction designed intentionally to be used as a backdoor? An illegal opcode or a sequence of instructions, which, when executed, would lead to, for example, jumping from user mode to Real Mode, which further can be used for privilege escalation or arbitrary access to physical memory from user mode.
This can be used as a weapon in emergency cases.
Also, for preventing other people from using that accidentally or after the discovery, they can define a public key and also a private one, which allows to execute that behavior, when it comes with the sequence of the key stored in some CPU registers and/or a sequence of stack memory values and/or a sequence of future instructions. I'm well-aware this may sound like a conspiracy theory!