I was on a bad psychedelic trip, accompanied with some other issues at the time and ending up making threatening statements to a very high level official, but no battery occurred whatsoever. Thank goodness, or I would probably not be writing this message
Certainly if a weakness is found in the clone it's also present in prod, but that's what contracts are for. And we also review logs to make sure.
edit: a clone of prod w/ only test data in it, not prod data.
If you have the foresight to be able to recognize a malicious action from the logs, why not have the software block those actions from the start?
What percentage of the vulnerabilities discovered are independently discovered by multiple pen testers?
Then you talk about "discovered and revealed vulnerabilities". But, your first sentence talks about "discovered vulnerabilities not revealed".
What you may be wanting is a honeypot, where a pentest client intentionally puts some vulnerabilities of various exploit difficulty into the clone environment to ensure pentesters are doing their job.