AI Incidents
Shelves of books inside the Library of Birmingham
Photo: Elliott Brown / CC BY-SA 2.0 (Wikimedia Commons)
news

Taxonomy: Incident vs. Vulnerability vs. Disclosure vs. Misuse

Four terms used interchangeably in AI security reporting, but each describes a different event and triggers a different response. This is the working taxonomy.

By Theo Voss · · 8 min read

Four words show up in AI security reporting almost interchangeably: incident, vulnerability, disclosure, misuse. They are not synonyms. Each describes a different kind of event, lives at a different point in time, and triggers a different operational response. Mixing them up produces bad reporting, bad triage, and bad regulatory submissions. This is the working taxonomy.

Incident

An incident is an event in which an AI system caused or contributed to a real-world impact, intended or not. The defining feature is impact-in-the-world. Until impact, there is no incident.

When a vendor publishes an “incident report,” they are using the word in this strict sense — something happened, someone was affected, and the organization is acknowledging it.

Vulnerability

A vulnerability is a weakness in an AI system that could be exploited to cause harm. The defining feature is potential, not actualization.

A vulnerability has a discoverer, a fix lifecycle, and (in mature ecosystems) a CVE identifier. A vulnerability becomes an incident when it is exploited and produces impact.

The trap: many AI security write-ups describe vulnerabilities as if they were incidents because the language is more dramatic. Discipline matters here. A demonstrated jailbreak is a vulnerability. A jailbreak that was used to defraud a hundred customers is an incident.

Disclosure

A disclosure is the act of making information about a vulnerability or incident public. The defining feature is the publication event itself.

A disclosure has a date, an author, and a set of channels through which it was published. Disclosures can be coordinated (under embargo, with the affected vendor) or uncoordinated (published without notice).

The relationship between disclosure and the others:

For incident reporting, the disclosure date is one of the four dates we record (see the methodology). It is distinct from the incident date.

Misuse

Misuse is the use of an AI system, working as designed, to cause harm. The defining feature is intentional adversarial use of capability — not a bug, not a misalignment, not a vulnerability.

The crucial distinction: misuse doesn’t require the model to fail. The model can be perfectly aligned, refuse no requests it was trained to refuse, and still be used as a tool for harm. Misuse is downstream of the model — it is a property of the user, the deployment, the application.

This matters editorially. A misuse-driven incident is not a model failure, and reporting that conflates the two contributes to the misperception that model providers can “fix” misuse with better alignment. Often they cannot, because the underlying capability is doing exactly what it’s supposed to do.

The four-way matrix

EventHas impact?Has weakness?Was published?Was the model doing its job?
IncidentYesSometimesSometimesSometimes
VulnerabilityNo (yet)YesSometimesNo (model failing)
DisclosureN/AAbout oneYesN/A
MisuseYesNoSometimesYes

These overlap. An exploited vulnerability is a vulnerability and an incident. A coordinated disclosure of a misuse pattern is a disclosure and a misuse case. The taxonomy is not categorical — it is a frame for asking the right question about an event.

Why we keep them separate

For incident reporting, mixing the terms produces measurable damage:

How readers should use this

When you read coverage of an AI security event, classify it before reading further:

Then read the piece looking for whether the writer maintains the same distinction. The good ones do. The aggregators don’t.

For broader coverage: the defensive cluster’s playbooks at guardml.io treat vulnerabilities and incidents as separate categories with separate runbooks. The policy-cluster post on EU AI Act Article 52 at aiprivacy.report handles disclosure obligations as a regulator-defined event. Keeping the terms straight makes both bodies of work coherent.

For more context, AI security digest covers related topics in depth.

Sources

  1. AI Incident Database glossary
  2. NIST AI Risk Management Framework (AI RMF 1.0)
  3. OECD AI Incidents Monitor — Definitions
#explainer #taxonomy #definitions #incident-tracking #methodology
Subscribe

AI Incidents — in your inbox

AI incidents, model failures, and adversarial-use cases — dated and sourced. — delivered when there's something worth your inbox.

No spam. Unsubscribe anytime.

Related

Comments