Skip to content
Jit

Jit

NEW
Category: ASPM
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 8, 2026
4 min read
Key Takeaways
  • Jit bundles its own SAST, SCA, secrets detection, IaC, CSPM, DAST, and container scanning engines with AI agents for automated triage and remediation.
  • Company Context Graph maps code repositories to cloud infrastructure, team ownership, and business context so AI agents can prioritize by reachability and impact.
  • Pre-built Security Plans for SOC 2, AWS FTR, and GitHub Security activate the right scanners and policies without manual configuration.
  • Scans run on Jit's managed infrastructure rather than inside your CI/CD pipelines; integrates with GitHub, GitLab, Bitbucket, Azure DevOps, and IDE plugins for VS Code, IntelliJ, and Cursor.

Jit is an AI agent ASPM platform for product security teams. It bundles its own SAST, SCA, secrets detection, IaC, CSPM, DAST, and container scanning with AI agents that automate triage, remediation, and compliance work.

Jit Sera AI agent dashboard showing security analysis and prioritization

Everything runs through what Jit calls the Company Context Graph, a knowledge graph that maps code repositories to cloud infrastructure, team ownership, and business context. Agents use this graph when analyzing and prioritizing findings.

The company is headquartered in Boston, backed by Tiger Global, Insight Partners, Boldstart Ventures, FXP, and TechAviv. SOC 2 Type 2 certified and an AWS Partner.

What is Jit?

Jit started as a developer-first ASPM platform and has since repositioned around AI agents. Unlike aggregation-focused ASPM tools that expect you to bring your own scanners, Jit ships its own scanning engines and puts AI agents on top to handle analysis, triage, and remediation.

Three ideas hold the platform together:

Company Context Graph
Maps your codebase, cloud resources, team structure, and business priorities into a single graph. Agents see where affected code sits in your architecture, who owns it, and whether it’s reachable in production.
AI Agents
Three types — Core Agents for security analysis, Pre-Built Agents for triage and fix generation, and Custom Agents for your own workflows. All follow a four-step loop: Plan, Execute, Reflect, Respond.
Security Plans
Packages of scanning controls and policies tied to a specific goal. Pick a plan (say, SOC 2) and Jit turns on the right scanners and checks for you.

Key Features

AI security agents

Jit’s agent system is the main differentiator from traditional ASPM tools:

  • Core Agents analyze findings, prioritize by context, and correlate issues across code and cloud using the Company Context Graph
  • Pre-Built Agents handle common jobs: triaging vulnerabilities, opening fix PRs, collecting compliance evidence
  • Custom Agents let teams build their own agents for organization-specific security workflows
  • All agents follow a four-step loop: Plan (break the task down), Execute (take actions), Reflect (check the results), Respond (deliver output)

Jit Company Knowledge Graph connecting engineering, security, and business layers

Key Differentiator
Unlike traditional ASPM tools that aggregate findings from external scanners, Jit’s agents use the Company Context Graph to understand reachability, ownership, and business impact before prioritizing a vulnerability.

Built-in security scanning

Jit runs its own scanners rather than wrapping third-party tools. All scans execute in Jit’s managed infrastructure, not in your CI/CD pipelines.

  • SAST - Static analysis of source code for security vulnerabilities
  • SCA - Dependency vulnerability detection and analysis
  • Secrets Detection - Scanning for exposed credentials and API keys
  • IaC Security - Infrastructure-as-code misconfiguration detection (Terraform, CloudFormation, Kubernetes)
  • CSPM - Cloud security posture management for AWS, Azure, and GCP
  • DAST - Dynamic application security testing
  • Container Scanning - Vulnerability detection in container images
  • SBOM Generation - Software bill of materials creation
  • License Detection - Open source license compliance checking

Jit vulnerability reporting dashboard with centralized tracking per team

Security Plans

Each plan bundles the scanners and policies you need for a particular goal:

  • MVS for AppSec - A starter set of scanning and controls for teams that want baseline coverage without configuration overhead
  • AWS Foundational Technical Review - Controls aligned to AWS FTR requirements
  • GitHub Security Best Practices - Security configuration tuned for GitHub-based workflows
  • SOC 2 Compliance - Controls mapped to SOC 2 certification requirements
  • Maximum Security - Turns on everything Jit offers

Jit Security Plans progress tracking showing control implementation status

IDE plugins

Jit has plugins for three IDEs:

  • VS Code
  • IntelliJ
  • Cursor

Jit bot flagging a security vulnerability directly in a pull request

Integrations

Jit integrates across 12 categories. Here are the main ones:

Source Code Management
GitHub GitHub
GitLab GitLab
Bitbucket Bitbucket
Azure DevOps Azure DevOps
Cloud & Infrastructure
AWS AWS
Azure Azure
GCP GCP
Wiz Wiz
Communication & Issue Tracking
Slack Slack
Microsoft Teams Microsoft Teams
Jira Jira
Linear Linear
CI/CD & Compliance
GitHub Actions GitHub Actions
GitLab CI GitLab CI
Jenkins Jenkins
CircleCI CircleCI
Drata Drata
Vanta Vanta

Getting started

1
Connect your SCM — Link GitHub, GitLab, Bitbucket, or Azure DevOps to give Jit access to your repositories.
2
Pick a Security Plan — Choose from MVS for AppSec, SOC 2, AWS FTR, or Maximum Security. Each plan activates the right scanners and policies.
3
Jit scans on its infrastructure — Scans run in Jit’s managed environment, not in your CI/CD pipelines. No build minutes consumed.
4
Review findings — See results in the Jit dashboard, your IDE (VS Code, IntelliJ, Cursor), or directly in pull request comments.

Jit also offers what it calls Velocity Engineers, staff who help with onboarding and initial configuration.

Jit ASPM platform interface showing risk scoring and prioritization

When to use Jit

Jit makes sense when you’d rather have one platform with its own scanners than stitch together separate SAST, SCA, secrets, and IaC tools yourself.

It’s a good fit if:

  • You don’t have a large existing security toolchain and want scanning built in from day one
  • You want AI agents doing triage and remediation instead of manual review cycles
  • Compliance (SOC 2, AWS FTR) is driving your security program and you’d rather pick a plan than configure controls one by one
  • Your developers are expected to own security outcomes, not hand them off to a separate AppSec team
  • You’d rather scans run on Jit’s infrastructure than eat into your CI/CD minutes

Jit DevSecOps metrics dashboard showing MTTR and exposure windows

Best For
Teams that want built-in scanning and AI-driven triage from day one, without assembling a multi-vendor security toolchain.

It’s probably not the right pick if:

  • You already have security tools you like and just need something to aggregate their findings
  • You need fine-grained control over individual scanning engines
  • All your tooling must run on-premises or in your own cloud accounts

The founding team includes CEO Shai Horovitz, CTO David Melamed (PhD), and Co-Founder Aviram Shmueli.

Frequently Asked Questions

What is Jit?
Jit is an AI-powered application security posture management (ASPM) platform. It combines AI agents with built-in security scanners across SAST, SCA, secrets detection, IaC, CSPM, DAST, container scanning, SBOM generation, and license detection. The platform uses a Company Context Graph to connect code, infrastructure, and business context.
How do Jit's AI agents work?
Jit offers three types of AI agents: Core Agents that handle security analysis across the platform, Pre-Built Agents for common workflows like triage and remediation, and Custom Agents that teams build for their own needs. Agents follow a four-step execution loop of Planning, Executing, Reflecting, and Responding.
What integrations does Jit support?
Jit integrates across 12 categories including source code management (GitHub, GitLab, Bitbucket, Azure DevOps), cloud providers (AWS, Azure, GCP), communication tools (Slack, Microsoft Teams, Jira, Linear), and more. It also supports IDE plugins for VS Code, IntelliJ, and Cursor.
Does Jit run in my CI/CD pipeline?
No. Jit runs scans in its own managed infrastructure rather than inside your CI/CD pipelines. You connect your source code management tool and Jit handles scanning independently.
What Security Plans does Jit offer?
Jit provides pre-built Security Plans including MVS for AppSec (minimum viable security), AWS Foundational Technical Review, GitHub Security Best Practices, SOC 2 Compliance, and Maximum Security. Each plan bundles the specific controls and scanners needed for that objective.