Using avbtool (from AOSP), you can create a stub vbmeta :
To the average user, vbmeta is invisible. To a modder, it’s the first dragon to slay before any custom software can breathe. Let’s tear it apart. Think of vbmeta as a tamper-evident seal for your phone’s most critical partitions. It’s not the lock on your door—it’s the signed wax seal that tells you if someone picked the lock.
adb shell su dd if=/dev/block/by-name/vbmeta of=/sdcard/vbmeta.img Then analyze it with avbtool info_image . You might be surprised what you find.