Every credential has two clocks. The first clock is compromise: when the attacker gets the key. The second clock is revocation: when the key stops working. The gap between them is the revocation gap.
Inside the gap, the attacker is indistinguishable from the legitimate user. Their actions pass every auth check, because they have the key that auth is supposed to check. Their actions show up in the logs with the rightful name attached, because logs record who presented the credential, not whether the credential-holder was the person. Detection systems tuned to look for intrusions see nothing, because there is no intrusion to see. The authenticated session IS the attack.
This is why defensive spend concentrated on the front door often produces diminishing returns. Stronger locks on the door, while the attacker walks in wearing the maintenance uniform. The locks worked. The revocation gap is not a bypass. It is the legitimate product of a correctly functioning system.
The pattern is not a theoretical concern. Every organization running long-lived credentials is running on the bet that the gap will be short enough that no attacker uses it for anything meaningful. The bet usually holds. Occasionally it does not, and the failure is invisible until much later, when someone audits the authentication logs and realizes that a window of perfect stolen-credential access was open for weeks. The length of the window is a property the defender can measure. Most organizations have never measured it.