Develop Cyber Security Challanges for CRL (multiple goups)

# Background:
The goal of this project is to design and implement a new cybersecurity challenge for use in [CRL](https://git.cs.kau.se/csma/cyber-range/crl) contests.
Challenges should follow the structure and style of the existing examples available here: [Public Challenges](https://git.cs.kau.se/csma/cyber-range/public-challenges).
Since many challenges in CRL are container-based, knowledge of Docker and containerization is required.
# Task:
Design and develop a cybersecurity challenge that aligns with existing CRL needs and knowledge.
The specific challenge type, epics, and sub-tasks will be discussed and evaluated together with the development team.
# Epic:
The challenge should be implemented in the same format as the examples provided: [Challenge Examples](https://git.cs.kau.se/csma/cyber-range/public-challenges/-/tree/main/examples).
The work should consist of the following key steps:
- Identification of a suitable vulnerability
- Documentation of the vulnerability and the challenge
- Implementation of the challenge
- Development of an automated solution for the challenge
# Legal and Technical Requirements:
- All source code produced in this project must be released under a permissive license that allows derivative works to be closed source (e.g., MIT License).
- Focus should be placed on product readiness, stability, and maintainability.
- Code must follow best practices, standardized language conventions, and provided templates.
- Automated checks, tests, and build procedures (via GitLab CI) should be implemented wherever possible.
- The final deliverable (including `docker-compose.yaml` and images) must be directly usable in CRL.
issue