I think the problem is the consensus is the NSA/GCHQ use the tool. Your disagreement is whether the NSA/GCHQ originated it. Your comment reads as if you disagree with there being proof of any use, based on the evidence in the article.
There's very little doubt the NSA/GCHQ use the tool.
Whether they originated it, though, is the crux of the issue. Nobody doubts that government agencies undertake cyberwarfare. But the idea that they might have created something that is now being used by nongovernmental parties is the scary thing - it's like saying that the Army lost a cache of weapons now being used by ISIS. (Which itself is true [1], but that's another story.)
There's very little doubt the NSA/GCHQ use the tool.
Here's some background reading:
https://news.ycombinator.com/item?id=8649402
https://news.ycombinator.com/item?id=8653454
https://firstlook.org/theintercept/2014/12/13/belgacom-hack-...