Would you use it?
To check if it works? Why not? There were more bad ideas than good ones. Before making every step, to break some hash functions, a lot of people did a lot of things wrong. So, testing a new idea is a normal thing to do. Which means: the new invention would be used, to produce at least one new block, if not more.
How much would you take?
It depends, if it is "full preimage for any value you want", or maybe "a quick 32-bit best nonce finder in O(1), for any given block header", or maybe "collision-only, limited to N rounds". The system is not in a binary state, like "attacked" or "not attacked". It is a spectrum of various attacks, where some of them are more harmful than others, and many different kinds of attacks, are opening the system for different threats. So: it depends, which attack do you have in mind.
Lets talk like morally, would you feel ok about using it?
Using it to fully disclose all details to the community? Why not? The best way to deal with some attack, is to make a patch, encourage the network to upgrade, and then fully disclose everything, so that everybody could be an attacker, and then going back is no longer possible, and some soft-fork, introducing some quantum-resistant algorithm, is irreversible (because it would be like reverting "Value Overflow Incident").
Would you think it's wrong, but do it anyway?
Timing is everything. If you know, how to break Enigma in 1939, then it is a different case, than if you know all of that in 2009, 70 years later. The same with breaking hash functions, elliptic curves, or anything like that. Knowing it today, in 2024, is a different thing, than knowing it in the future, after the whole network is upgraded.
Would you take a to the victor goes the spoils approach to it?
No. But: the answer to your question can be already seen in practice, to some extent, if you observe some altcoins, and some test networks. For example: it is possible in testnet3 and testnet4, to mine coins on your CPU, and compete with ASICs. Then, the situation looks like that: someone uses just a CPU, and nothing else, and can get 50 tBTC. Someone else uses ASICs, and burns a lot of energy, for exactly the same 50 tBTC. See? Test networks can already show you, how people behave, when they can secretly mine blocks on their CPUs, and get them deeply confirmed, without doing as much work as ASIC owners. And I guess the same will happen here.
Whats expected of that person who does it first?
It depends, who it will be. But in general, you can expect that the secret will be quickly revealed. Why? Because statistics can tell you the truth. Too many eyes are looking at chainwork, to execute it, and become unnoticed. Too many eyes will see, that the difficulty will increase. Going beyond 51% is a red line, which can be used to quickly trigger an upgrade. But even by not being greedy, and mining only some blocks, like "10%" or "1%", it can be noticed, if the attack will require some specific data structures.
Timing is a powerful tool. It revealed some very serious attacks:
https://en.wikipedia.org/wiki/XZ_Utils_backdoorAnd people often notice much less concerning anomalies, when it comes to invalid blocks:
https://bitcointalksearch.org/topic/error-connectblock-too-many-sigops-invalidchainfound-invalid-block-5447129Also, when it comes to some practical attacks, then I expect it is much more likely, to inject some bad code to the repo (and affect those, who will upgrade), than to execute a serious quantum attack.