When JIT is deployed without strict guardrails, you haven't eliminated the risk of unauthorized access. You've just automated it for the adversary.