Exploit walkthrough for #12:
deploy the malicious vault Contract (for the upgrade)
create interface for 4 low level calls (to):
set attack contract as a proposer for time lock (time lock)
update the delay to 0 (time lock)
upgrade the contract to new implementation (original Vault)
exploit function (in the attack contract (attack contract)
The real hack:
call the execute function(with a, b, c, d as args) (time lock)
Exploit Logic: