DéjàDéjài
INTEGRATIONS // ZERO-INSTRUMENTATION

Zero-Instrumentation Forensics.

Déjà connects to observability, source control, and audit systems to build a deterministic CHAIN_OF_CUSTODY — without agents, SDKs, or code changes. Every uplink is auditable. Every match is provable.

> MODE: webhook_ingest
> ACCESS: least_privilege
> PROOF: deterministic_linkage
> RETENTION: zero_payload
Ecosystem HUD

Verified Uplinks

Each integration is treated as a hardened perimeter connection. Status indicates readiness to ingest, fingerprint, and correlate.

Sentry
Observability
STATUS: LINK_READY
CAPABILITY:STACKTRACE_INGEST + RELEASE_TAGS
TRANSPORT:OAUTH + WEBHOOK
GitHub
Source control
STATUS: LINK_READY
CAPABILITY:REPO_FINGERPRINTING
EVIDENCE:PR_DIFF + COMMIT_GRAPH
Jira
Audit & reporting
STATUS: LINK_READY
CAPABILITY:EVIDENCE_LOG_EXPORT
MODE:WRITE_SAFE
Chain of Custody

Three Columns of Custody

Evidence flows from telemetry to verification to audit reporting — preserving the exact path from incident signal to verified fix.

Evidence Collection (Telemetry)

COLLECT
Sentry/ errors, releases
LINK_READY
> INGEST: stack_traces + breadcrumbs
> NORMALIZE: paths_and_line_numbers
Datadog/ traces, logs
LINK_READY
> ATTR_EXTRACT: service + env + version
> FINGERPRINT_INPUT: error_signature

Verification (Fix Proof)

VERIFY
GitHub/ PRs, commits
LINK_READY
> CAPABILITY: REPO_FINGERPRINTING
> PROOF: diff_hash ↔ incident_hash
GitLab/ merge requests
LINK_READY
> CAPABILITY: CHANGESET_LINKAGE
> VALIDATE: gates_passed

Audit Log (Reporting)

REPORT
Jira/ tickets
LINK_READY
> EMIT: chain_of_custody_record
> ATTACH: verified_fix_evidence
Slack/ notifications
LINK_READY
> POST: recurrence_summary
> ESCALATE: on_call_channel
The Core Stack

Deterministic links across your toolchain

Déjà is the deterministic bridge between systems that REPORT failures and systems that PROVE fixes.

Source control
Repository fingerprinting
Identify the exact PR / commit that resolved an incident and persist proof that survives refactors and turnover.
> OAUTH_SCOPES_REQUESTED:
  • repo:status ●
  • read:org ●
  • pull_requests:read ●
  • metadata:read ●

> GUARANTEE: least_privilege_only // no_write_access
CAPABILITY:DIFF_HASHING + COMMIT_GRAPH
Observability
Real-time signals
Ingest errors and releases via webhooks. No agents. No SDKs. No runtime overhead.
> OAUTH_SCOPES_REQUESTED:
  • event:read ●
  • project:read ●
  • org:read ●

> WEBHOOK_EVENTS:
  • issue.created
  • issue.resolved
  • release.created

> GUARANTEE: payload_discarded_immediately
CAPABILITY:STACKTRACE_INGEST + CONTEXT_TAGS
Why Déjà integration is different

Hardened continuity — zero performance impact

Traditional tools require instrumentation. Déjà operates as a secure pass-through analysis layer. If Déjà is unavailable, your services keep running.

UPLINK_STABILITY: VERIFIED
Your production performance is safe.

We ingest via async webhooks + read-only APIs. No inline request interception. No agents on hosts.

LIVE_LATENCY: ~0ms (out-of-band)
Ingestion lanes
Dual-lane ingestion
> LANE_1 (historical): backfill_window = 730_days
> LANE_2 (real_time): webhook_stream = enabled
> GUARANTEE: no_runtime_hooks // no_sidecars
Permissions
Least privilege access
> ACTUAL_SCOPES_REQUIRED:
  • events:read
  • pull_requests:read
  • metadata:read
> WRITE_ACCESS: false
Enterprise

Request Custom Protocol Adapter

Running a legacy or on‑prem system? Submit a spec and we'll respond with an integration review and security posture.

Supported request patterns

We handle custom ingestion over secure webhooks, polling bridges, and event buses.

> INPUTS:
  • webhook_events (signed)
  • read_only_polls (rate-limited)
  • message_bus (fanout_safe)

> OUTPUTS:
  • custody_record_export
  • verified_fix_links
  • audit_ready_artifacts
INTEGRATION_REQUEST
> RESPONSE_SLA: 2_business_days // SECURITY_REVIEW: included