GTIG Named the AI Models That Did Not Build the Exploit. The Procurement Gap Is What Stays Unnamed.
The Disclosure Asymmetry Is the Story
On May 11, 2026, Google's Threat Intelligence Group published the first confirmed case of an AI-built zero-day caught in the wild, a 2FA bypass against a "popular open-source, web-based system administration tool" that a "prominent cyber crime threat actor" had staged for mass exploitation. GTIG coordinated with the vendor to patch under embargo before the campaign could fire. They named two AI providers explicitly ruled out, Gemini and Anthropic's Mythos, and they declined to name three things: the AI model that actually built the exploit, the vendor that was patched, and any CVE identifier for the flaw.
The exploit running successfully is the predictable part of this story. The disclosure pattern is the part that creates a new procurement-diligence category, and it is the part procurement teams have no current language to handle. The disclosure-silence-as-signal frame is one I have used before, for Trellix's source-code breach statement that left three specific questions unanswered and for Anthropic's safety report announcing hundreds of zero-days without CVE identifiers; the GTIG announcement is the third instance, and the procurement implications are the sharpest.
The Evidence
GTIG's primary disclosure names the AI tells in the recovered exploit code: a hallucinated CVSS score, an abundance of educational docstrings, a structured Pythonic format that looks textbook-clean, and an ANSI color class organized as a tidy _C constant. GTIG states plainly, "we do not believe Gemini was used." CyberScoop reports that Anthropic's Mythos, the restricted defensive model that I covered in the Project Glasswing post on selection-criteria opacity, was likewise explicitly ruled out. Both exclusions rest on telemetry the respective providers maintain against their own published red-team posture; the exclusions are symmetric, and neither tells the reader which model was actually used.
Prior GTIG cases did name the model. The November 2025 AI Threat Tracker attributed PROMPTFLUX to Gemini and PROMPTSTEAL to Qwen2.5-Coder-32B-Instruct, sourced via Hugging Face. The May 2026 case is the first in GTIG's tracker where the provider is structurally unnameable, and the mechanism is what BleepingComputer's coverage describes as threat actors "industrializing access to premium AI models" through laundered API endpoints. It is also not the first AI-built offensive tooling to surface operationally; VoidLink's 88,000-line malware framework was the framework-side bookend earlier this year, and the GTIG case is the first where the toolchain provenance was deliberately withheld at disclosure. The provider is unnamed because the provider is, in the procurement sense, untraceable.
The vendor that received the embargo patch is also unnamed. SecurityWeek confirms that no CVE has been assigned. CyberScoop quotes John Hultquist of GTIG: "We finally uncovered some evidence this is happening. This is probably the tip of the iceberg and it's certainly not going to be the last." The patch is in production, and customers running the affected administration tool received it through the normal update channel, with no notification that the version delta closed an actively weaponized flaw scheduled for a mass-exploitation event.
That is the new category. The vulnerability sits between "vulnerable" and "patched (CVE published)"; the accurate label is "patched under embargo." No SOC 2 control asks about it, no vendor security questionnaire asks about it, and no standard contract carries a notification right that would surface it.
The Counterargument
The reasonable objection is that the embargo worked, the patch shipped, and the customer base is now safer than it would have been if the flaw had been disclosed publicly while the threat actor was still staging. That defense is correct for the specific incident: coordinated disclosure beat the campaign to the field, and silent patching is a legitimate tool when the alternative is an active mass-exploitation window aimed at customers who could not have patched faster than the adversary could pivot.
The objection misses the structural question. Coordinated disclosure works when the customer is on a patch cadence tight enough to absorb the silent update, and when the customer has any way to know whether they were in the embargo cohort. Neither condition holds for the affected tool here. Customers running it through May 11 had no signal that the version delta they applied was load-bearing against an in-the-wild adversary; customers still running an unpatched version do not know they are exposed to a campaign that was already operationally ready. The asymmetry is between Google's telemetry and the customer's purchase order, and the purchase order has no field for it.
Resolution: The Embargo-Cohort Notification Right
The procurement gap is a missing contractual right, not a missing patch. CISOs running the affected administration tool this week cannot answer a question their board will reasonably ask: were we in the embargo cohort, and for how long? The vendor knows. GTIG knows. The customer does not, because nothing in the standard procurement stack obligates the vendor to tell them.
The fix is a clause, not a tool. A workable embargo-cohort notification right reads: "Vendor will notify Customer within 30 days of any security patch issued under a coordinated-disclosure embargo that, if unpatched, would have exposed Customer to a known threat-actor campaign in the preceding 90 days." That clause does not break embargo, since it fires only after the patch is in production and after the disclosure window has closed. It does give the customer a measurable exposure window to report internally, audit retrospectively, and price into renewal terms.
The same procurement-language gap appeared in the shared-kernel SaaS context I wrote about in Copy Fail and the SOC 2 question procurement does not ask, in the self-hosted-runtime context covered in Self-Hosted AI Runtimes Are 2026's Shadow IT, and in the MSP-tier silent-patch context I traced through cPanel's two-month intel asymmetry between upstream providers and small hosting customers. The pattern repeats across each: the security event lands first, the procurement language catches up later, and the unmeasured exposure window between those two moments is where CISOs are accountable without being informed. Hultquist's framing on the AI side, as reported by CyberScoop, is that "the capability trajectory is pretty sharp." The procurement-language trajectory is not.
For the CISO running an open-source web-based administration tool this week: ask the vendor in writing whether the most recent security update closed an embargoed flaw and request the date range of customer exposure. For the procurement team negotiating any 2026 renewal of an administration, identity, or shared-infrastructure tool: add the embargo-cohort notification clause before signature. The named models are the part of this story that resolved on May 11; the unnamed cohort is the part still in front of you.