DéjàDéjà
INTEGRATIONS // ZERO-INSTRUMENTATION

Zero-Instrumentation Forensics.

Déjà connects to observability, source control, and audit systems to build a deterministic CHAIN_OF_CUSTODY — without agents, SDKs, or code changes. Every uplink is auditable. Every match is provable.

> MODE: webhook_ingest
> ACCESS: least_privilege
> PROOF: deterministic_linkage
> RETENTION: zero_payload
Ecosystem HUD

Verified Integrations

Each integration is treated as a hardened perimeter connection. Status indicates readiness to ingest, fingerprint, and correlate.

Sentry
Sentry
Observability
STATUS: LINK_READY
CAPABILITY:STACKTRACE_INGEST + RELEASE_TAGS
TRANSPORT:OAUTH + WEBHOOK
GitHub
GitHub
Source control
STATUS: LINK_READY
CAPABILITY:REPO_FINGERPRINTING
EVIDENCE:PR_DIFF + COMMIT_GRAPH
Slack
Slack
Collaboration
STATUS: LINK_READY
CAPABILITY:INCIDENT_BROADCAST
MODE:WRITE_SAFE
Chain of Custody

Three Columns of Custody

Evidence flows from telemetry to verification to audit reporting — preserving the exact path from incident signal to verified fix.

Evidence Collection (Telemetry)

COLLECT
Sentry/ errors, releases
LINK_READY
> INGEST: stack_traces + breadcrumbs
> NORMALIZE: paths_and_line_numbers

Verification (Fix Proof)

VERIFY
GitHub/ PRs, commits
LINK_READY
> CAPABILITY: REPO_FINGERPRINTING
> PROOF: diff_hash ↔ incident_hash

Audit Log (Reporting)

REPORT
Slack/ notifications
LINK_READY
> POST: recurrence_summary
> ESCALATE: on_call_channel
The Core Stack

Deterministic links across your toolchain

Déjà is the deterministic bridge between systems that REPORT failures and systems that PROVE fixes.

Source control
Repository fingerprinting
Identify the exact PR / commit that resolved an incident and persist proof that survives refactors and turnover.
> OAUTH_SCOPES_REQUESTED:
  • repo:status ●
  • read:org ●
  • pull_requests:read ●
  • metadata:read ●

> GUARANTEE: least_privilege_only // no_write_access
CAPABILITY:DIFF_HASHING + COMMIT_GRAPH
Observability
Real-time signals
Ingest errors and releases via webhooks. No agents. No SDKs. No runtime overhead.
> OAUTH_SCOPES_REQUESTED:
  • event:read ●
  • project:read ●
  • org:read ●

> WEBHOOK_EVENTS:
  • issue.created
  • issue.resolved
  • release.created

> GUARANTEE: payload_discarded_immediately
CAPABILITY:STACKTRACE_INGEST + CONTEXT_TAGS
Why Déjà integration is different

Hardened continuity — zero performance impact

Traditional tools require instrumentation. Déjà operates as a secure pass-through analysis layer. If Déjà is unavailable, your services keep running.

UPLINK_STABILITY: VERIFIED
Your production performance is safe.

We ingest via async webhooks + read-only APIs. No inline request interception. No agents on hosts.

PERFORMANCE_IMPACT: 0.00ms
Ingestion lanes
Dual-lane ingestion
> LANE_1 (historical): backfill_window = 730_days
> LANE_2 (real_time): webhook_stream = enabled
> GUARANTEE: no_runtime_hooks // no_sidecars
Permissions
Least privilege access
> ACTUAL_SCOPES_REQUIRED:
  • events:read
  • pull_requests:read
  • metadata:read
> WRITE_ACCESS: false
Enterprise

Request Custom Integration

Running a legacy or on‑prem system? Submit a spec and we'll respond with an integration review and security posture.

Supported request patterns

We handle custom ingestion over secure webhooks, polling bridges, and event buses.

> INPUTS:
  • webhook_events (signed)
  • read_only_polls (rate-limited)
  • message_bus (fanout_safe)

> OUTPUTS:
  • custody_record_export
  • verified_fix_links
  • audit_ready_artifacts