I'm not worried about dead mice; I'm worried about tampering. I would have hoped there'd be more guidance than "just look and see if anything looks weird". A determined threat actor can easily side-step that check with, for example, careful desoldering/resoldering technique.