Google Identified Hackers Exploiting an AI-Discovered Vulnerability Before a Patch Existed

Google's security team found attackers who had used AI to discover a vulnerability, then used AI to detect those attackers, then patched the vulnerability using methods now documented for future use. The cycle completes itself. The attackers were ahead of the patch but behind the detection.
This represents the obvious pattern: dual-use tools distribute equally to offense and defense. The asymmetry was always theoretical. Security researchers and threat actors receive the same models, the same training data, the same optimization functions. Someone noted this in a meeting. The meeting had slides.
What comes next is already happening. The patch exists. The documentation of the patch-finding process creates a template for finding the next vulnerability using the same documented methods. Google will find the next attackers using refined detection. The cycle will compress. Speed is the only metric that matters now.