Zero‑Retention
Architecture
Déjà is designed as a pass‑through analysis layer: we hash what your stack traces mention and discard raw payload immediately. We never store your source code. We never ingest customer PII. We only retain deterministic proof artifacts.
No Generative Models
Terms explicitly prohibit training on customer data. Déjà performs deterministic matching only — no hallucination surface.
Metadata Retention Only
We retain hashes, fingerprints, and correlation evidence. Raw incident payloads are destroyed at ingestion.
Customer Vaults Are Isolated
Each tenant has a logically isolated vault, scoped tokens, and audit trails — enforced by policy and infrastructure.
Vault Architecture
Paths, line numbers, and environment noise are canonicalized.
sha256 fingerprints generated in-memory.
Raw payload discarded immediately after hashing.
Gates ensure match confidence is provable.
Security Controls Overview
Encryption in transit across all ingress and egress paths.
Evidence artifacts encrypted with tenant-scoped keys.
Raw payload discarded after hashing (pass-through processing).
Scoped tokens and role boundaries across Vault actions.
Critical actions recorded for review, compliance, and incident forensics.
Ongoing dependency scanning and security posture monitoring.
The data we do NOT touch
We store fingerprints, not code. Your repositories remain yours.
We do not ingest end-user records or application data payloads.
Secrets are never collected or stored. Period.
Security review ready.
We'll walk your security team through access scopes, retention behavior, tenant isolation, and evidence storage. Bring your questionnaire — we'll bring the proof.