Vulnerability detection

Examples in this section attempt to detect some vulnerabilities present in REVEN scenarios.