Private beta — request access
1. Connect.
2. Ask questions.
That's IT.
Transit AI is a cross-platform SSH client with a read-only AI assistant for investigating switches, routers, and firewalls. Every command the AI proposes passes a per-vendor permit list and your explicit click. Always both, never either.
The IT is the point.
macOS · Windows · Linux · Free during beta
CSR1# show version | i Version Cisco IOS XE Software, Version 16.11.1b Cisco IOS Software [Gibraltar], Virtual XE ROM: IOS-XE ROMMON CSR1# show netconf-yang status netconf-yang: disabled netconf-yang ssh port: 830 CSR1# _
What version is this device and is NETCONF enabled?
IOS-XE 16.11.1b on a CSR1000V.
NETCONF is disabled; SSH 830 is
configured but netconf-yang
isn't running. Candidate datastore is also disabled.
4,866 in · 56 out · 0% of budget
The three inviolable rules
Not preferences. Not promises. Built into the product — and verified on every release we ship.
Rule 1
Your SSH credentials stay in your OS keychain — Transit AI's UI never reads them back.
Rule 2
The AI has four abilities — list, read, propose, ask. It can't gain a fifth at runtime.
Rule 3
Every AI-suggested command passes the vendor permit list AND your explicit click.
Built for network engineers
Your old SSH client just got upgraded — now with an AI that can investigate but can't break things.
Read-only AI agent
Ask, don't bash. The AI investigates with four tools — list, read, propose, ask — and every proposed command runs through a per-vendor permit list AND your explicit click. Always both, never either.
Per-vendor command policy
Default-deny regex lists for Junos, Cisco IOS / IOS-XE / NX-OS, Arista EOS, PAN-OS. Shell-escape verbs are explicitly blocked (no start shell, no tclsh, no app-hosting).
The AI never sees your credentials
Even a jailbroken model can't ask for your password — the AI and the credential store are isolated components with no programmatic path between them. An automated check fails the build if anyone tries to add one.
Multi-session tabs
The tab strip you already know. One terminal pane per session, scrollback survives tab switches. Right-click for rename, export scrollback, split right, close.
Secrets stay in your keyring
macOS Keychain, Windows Credential Manager, Linux Secret Service, or the SSH agent. Provider API keys (Anthropic, OpenAI) live in isolated proxy infrastructure — never on disk in the app.
Output redaction
PEM blocks, encrypted passwords, AWS keys, JWTs — stripped before scrollback ever reaches the LLM. Per-conversation ordinals (REDACTED:pem#1) let the agent reason about credential equivalence without seeing bytes.
Quick copy/paste, syntax highlighting
Per-device toggles. Auto-copy on selection, right- or middle-click paste, multi-line paste confirmation. Familiar, but way better.
Session export with re-redaction
Export any session's scrollback to a file. Re-runs the redaction filter on save and offers age encryption so a shared transcript can't accidentally leak.
Investigate faster. Touch nothing.
Free during beta. Sign up and start a session.