AI Incidents
A printed business document with annotations and a pen on a desk
news

Anatomy of a Vendor Advisory: Reading What Isn't Said

Vendor advisories from AI model providers follow a recognizable shape. Knowing what to look for — and what's intentionally omitted — turns a marketing document into actionable intelligence.

By Theo Voss · · 8 min read

A vendor advisory is the most authoritative document a model provider produces about a security event. It is also a piece of communication crafted by a team that has legal, communications, and engineering constraints. Reading it well requires understanding both layers — what the advisory says, and what shape of event the document is built to address.

The standard sections

Most mature AI-vendor advisories follow a shape similar to the OpenAI / Anthropic / Microsoft conventions, with minor variations:

Summary

One-paragraph plain-language description. Optimized for a reporter, not an engineer. Read it for the category of event (data exposure, jailbreak class, supply-chain compromise) and the blast radius in coarse terms (number of users, regions affected, services involved).

Timeline

Dated bullet list. Look for:

The gap between detection and notification is the most operationally relevant number in the document. A short gap suggests mature IR. A long gap is usually noted as part of an apology, not as a deficiency.

What happened (technical)

The technical section. Length varies by vendor culture — Anthropic and OpenAI tend toward longer technical narratives; some others stay terse. Read for:

Who was affected

The scope of impact. Vendors usually disclose:

What they don’t usually disclose: named customers, exact data records, the precise method of attacker identification.

What we did

The containment and remediation actions. Read for:

What you should do

The action item for users. Often short. Usually rotate-things-and-watch-logs. Always do it.

What we’re doing next

The forward-looking commitments. Read these with calibrated skepticism. “We are investing in” is not the same as “we have shipped.” Track these over the months following the advisory — mature vendors publish follow-up notes; less mature ones do not.

What’s not in the advisory

Things you won’t find in the document, and where to look instead:

Language to flag

Specific phrases worth dwelling on:

Cross-checking the advisory

A well-resourced security reader cross-checks every advisory against:

  1. Other vendors’ advisories. If a CVE in a shared dependency is referenced, check all consumers of that dependency.
  2. Regulator filings. EU AI Office disclosures, FTC consent orders, ICO actions sometimes contain detail the advisory omits.
  3. Court filings. If the incident triggers litigation, complaints will surface in PACER over the following weeks.
  4. Customer disclosures. Affected customers may publish their own communications. These often have detail the vendor advisory lacks.
  5. Independent research. Researchers who reproduced or analyzed the incident often publish their own write-ups.

The advisory is a starting line. The full picture is in the cross-checks.

Reading cadence

For incident reporting, we treat vendor advisories as Tier 1 sources and read them within hours of publication. The reading is structured:

  1. Read summary once. Note category and blast radius.
  2. Skip to timeline. Note detection-to-notification gap.
  3. Read technical section. Identify failure class.
  4. Read action items. Note for any of our covered audiences.
  5. Skim what-we’re-doing-next. Add to a tracking list for follow-up.

The whole reading takes 15-20 minutes for a substantive advisory. The write-up that follows is shaped by what’s in the document, what’s missing, and what we can corroborate.

Cross-references

For monitoring-side coverage when a vendor advisory implies new detection requirements, the engineering cluster at mlobserve.com covers the tracing patterns that surface these signals in your own deployment. For policy-side analysis when an advisory has regulatory implications, the aiprivacy.report coverage of EU AI Act disclosure obligations is the standing reference.

Why this matters

The vendor advisory is one of the few documents in the AI security world that is both authoritative and timely. Reading it correctly turns it from a marketing artifact into operational intelligence. Reading it poorly means missing the things the document is structured to communicate — and the things it’s structured not to.

For more context, AI security digest covers related topics in depth.

Sources

  1. Anthropic Security & Trust
  2. OpenAI Security at OpenAI
  3. Google DeepMind Responsible Disclosure
#explainer #vendor-advisory #disclosure #incident-response
Subscribe

AI Incidents — in your inbox

AI incidents, model failures, and adversarial-use cases — dated and sourced. — delivered when there's something worth your inbox.

No spam. Unsubscribe anytime.

Related

Comments