Require a docker/script that provides for the necessary conditions for the exploit, along with a POC. If something is impossible to provide a POC for, as it's more of a speculative attack, require vetting like arxiv.
Most people's initial contributions are going to be more concrete exploits.
Most people's initial contributions are going to be more concrete exploits.