Monitor the AppSec risks that matter
most to you with Custom Agents

Instead of manually pulling data and building reports, create Custom Agents that generate continuously updated dashboards with a single prompt.

The easiest and most flexible way
to stay on top of the risks you actually care about

“Please track every PR that contains security issues from the last week and update it every day. Open a fix PR to resolve the newly introduced security risks.”

Here is high-risk PRs in the last week:
Repository
PR#
Author
Issue Type
Severity
File Affected
Status
jit-webapp
#3300
@shaijit
Vulnerable Dependencies
HIGH
package.json, package-lock.json
Open
View PR
test
#380
@Moshikol
SQL Injection
CRITICAL
pr_agent.py
Open
View PR
jit-backend
#892
@amir-jit
Misconfiguration
MEDIUM
docker-compose.yml
In Review
View PR
jit-mobile
#156
@arielbeckjit
Policy Violation
HIGH
src/utils/encryption.ts
Open
View PR
jit-webapp
#1249
@avichayJit
Vulnerable Dependencies
MEDIUM
src/components/Chart.tsx
Merged
View PR

Flexible and contextual product security monitoring

Jit’s Custom Agents learn your unique context by connecting to your code, cloud, ticketing systems, and documentation. This enables our agents to analyze risks within your specific context, so you can monitor risks like:

Monitor open tickets nearing vulnerability SLA
Example Prompts

Create a continuously updated dashboard tracking unresolved vulnerabilities close to breaching SLAs.

  • Breakdown by severity level and SLA deadline.
  • Assigned owner and current ticket status.
  • Trend of SLA breaches over time.
Monitor public endpoints with critical vulnerabilities
Example Prompts

Create a continuously updated dashboard of exposed endpoints carrying critical risks.

  • Endpoint ownership and associated application/service.
  • Proof-of-exploit or CVE references tied to the vulnerability.
  • Time since detection and remediation progress.
Monitor IAM roles with admin privileges assigned to users
Example Prompts

Create a continuously updated dashboard surfacing risky identity and access misconfigurations.

  • List of affected users and their last login activity.
  • Associated cloud services/resources accessed by those roles.
  • Policy compliance status (e.g., MFA enabled/disabled).
Monitor containers running with root privileges
Example Prompts

Create a continuously updated dashboard flagging insecure container deployments. Please include:

  • Container image source and build origin.
  • Runtime environment (production, staging, dev).
  • Linked vulnerabilities within the container image.
Monitor scanner findings marked as false positives by developers
Example Prompts

Create a continuously updated dashboard of security alerts developers have dismissed as false positives. Please include:

  • Distribution by scanner/tool type.
  • Review status or confirmation from the security team.
  • Reoccurrence of similar false positives over time.
Monitor policy violations in SOC 2–scoped systems
Example Prompts

Create a continuously updated dashboard mapping violations against SOC 2 control requirements. Please include:

  • Control categories with the most violations (e.g., access, change management).
  • Impacted systems and business processes.
  • Historical trends in SOC 2 compliance posture.
Monitor hardcoded secrets in my payments service
Example Prompts

Create a continuously updated dashboard detecting sensitive credentials embedded in critical code paths. Please include:

  • Type of secret detected (API key, password, token).
  • File and repository location of the secret.
  • Time since introduction and remediation owner.
Monitor reachable CVEs in production
Example Prompts

Create a continuously updated dashboard showing exploitable CVEs in live environments. Please include:

  • Attack path analysis showing how the CVE could be reached.
  • Business impact (apps, services, or customers affected).
  • Mitigation or patch status.

Custom Agents offload the work needed to enrich and act on risks

Automatically suggest and execute next steps for remediation
Ask Jit’s Custom Agents to offer remediation guidance, open fix PRs, and open tickets for specific AppSec issues.
Investigate and contextualize scanner findings to explain  risks to the business
Ask Jit’s Custom Agents to explain how scanner findings impact the business, like determining potential revenue or compliance impacts of exploitation.
Enrich findings with helpful context to quickly understand impact and next steps
Custom Agents enrich security issues with team ownership, exploitability analysis, impacted services, ticket status, and so much more.

Create, modify, and save your Custom AI Agents to monitor risks over time

Create your own Custom Agent library
Create and save your Custom Agents that monitor different risks over time, and revisit them to track changes without having to pull any new data.
Configure updates and notifications
Determine how often your Custom Agents should refresh dashboards, while defining which changes should trigger notifications to endpoints like Slack or Jira.
AI transparency explains how the agent works
Jit’s Custom Agents record and document every action to ensure users can understand how they arrived at specific conclusions and reports.

How do you know Jit’s Custom Agents produce accurate and relevant results?

Jit’s Custom Agents query your Company Knowledge Graph, which is automatically generated based on Jit’s integrations with your codebase, cloud environment, security tools, and documentation. They only return insights grounded in this graph, ensuring findings are accurate, contextual, and aligned with your environment, policies, and priorities.

Engineering Layer

Code-to-cloud-to-runtime integrations

Security Layer

30+ security scanners integrations

Business Layer

Internal policies + compliance reqs

Company Knowledge Graph