Detecting Vulnerabilities in Cloud-Native Architectures : vi