Security that grows with your product

Our model replaces one-off tests with ongoing collaboration, so you can confidently ship software that’s actually secure.

Quarterly - € 950/pm

Quarterly security review
Yearly formal report
Yearly summary report
✓ Quarterly check-ins (1 hour)
✓ Issue tracker integration
✓ Guided vulnerability handling
✓ Open support channel

For teams starting out with serious software security

Bi-monthly - € 1650/pm

Bi-monthly security reviews
Bi-yearly formal reports
Bi-yearly summary reports
✓ Bi-monthly check-in (1 hour)
✓ Issue tracker integration
✓ Guided vulnerability handling
✓ Open support channel
✓ Disclosure process template

For teams building credibility and secure software

Monthly - € 2450/pm

Monthly security reviews
Quarterly formal reports
Quarterly summary reports
✓ Monthly check-in (1 hour)
✓ Issue tracker integration
✓ Guided vulnerability handling
✓ Open support channel
✓ Disclosure process template
✓ Handling of inbound disclosure

For growing organizations and fast-moving products

Let’s talk and explore if we’re the right fit

We’ll zoom into your needs, show how we manually review your code, and answer any security questions you have.

Security diagnostics - € 495

A clear first step if you’re not sure where to begin.

✓ One-hour security strategy session
✓ One-hour technical deep dive with your team
✓ Architecture and CI/CD walkthrough
✓ Best practices and scanner review
✓ Insight report on assets, risks, and next steps

Traditional pentest - starts at € 5000

For compliance, procurement, or audits like ISO 27001, DigiD, or PCI MPoC.

✓ Executed whitebox or blackbox
✓ Fully compliant PDF report format
✓ No automated scanners or false positives
✓ On your schedule, with our full attention

advanced services as deep as nation-state level

Security for what others miss

Are you building high-risk or high-impact software that simply cannot fail? From cryptography to side channel analysis, we help prevent the kinds of problems that would break your product or your trust.

  • Whitebox cryptography
  • Software fault injection and side channel analysis
  • Zero-knowledge proofs and cryptographic protocols
  • Embedded systems and trusted execution environments
  • Protocol design and analysis
  • Reverse engineering
  • Vulnerability research and exploitation
  • Secure coding and design training for developers

We’ve secured and broken everything from secure bootloaders to advanced cryptographic systems. If it’s complex, sensitive, or critical, we can help.

What does the subscription cover?

With ∞ code analysis, our expert security analysts will fully review the current version of your code from a security perspective, after which they will follow along as you develop. This means that we review all new code that is committed (as long as it is within the limits defined by the subscription) on a monthly basis, typically before it hits production. Not literally as you type, but never later than a month from typing! Security issues will be shared as soon as found, and reports as often as you need them. Your software will receive attention for an amount of hours based on the development rate of your product.

What does "full code coverage" mean?

Once our ∞ code analysis service is integrated with your project, our primary goal is to "catch up" with your development and acquire a full overview and understanding of all the security-sensitive functionality in your existing codebase. You can decide to spread this initial phase (and associated cost) over multiple months if you wish; or set the slider to 1 month if your goal is to achieve coverage as fast as possible.


Typically, after this one-off investment, monthly reviews of your updates require a smaller effort. This is why we differentiate these two phases, so you always pay for what you get.

Does Codean Labs securely store source code?

Codean Labs takes security seriously, and employs industry-standard measures to protect your assets, such as your code and any potential findings. Because we connect straight to your code-hosting platform (e.g. Github, Gitlab, ...), there is no need to transfer ZIP files or use third-party cloud storage.

When can you start?

We try our best to meet your needs, aiming to start as soon as you are ready! Together with you, we will agree upon a specific start date.

Will I receive a shareable summary report?

Yes! You may need to give your client(s) or management an insight into the security of your product. We got you covered with periodical summary reports showing the overall security of your software (without revealing critical details) as well as your developments over time.

What types of software do you pentest?

We have a very wide expertise in terms of software security. So anything from embedded to cloud and in between is within our capabilities to pentest. In practice, what we see most are web and mobile applications, and associated backend(s) and cloud infrastructure.


Even in the design phase, we can help by reviewing your planned technical design or architecture. By giving you early feedback from a security perspective, we can help you build a strong core, making sure no time is wasted refactoring it later.

What sets Codean Labs apart from other pentesting companies?

We believe security review can be done both more throughly and more cost-efficient, whereas other labs often compromise on one of these two. We achieve this through our home-grown tooling and processes that we have optimized over time.

What do white-, grey-, and black-box mean?

These are industry terms for approaches that can be taken when evaluating the security of software systems.


When using a whitebox approach, pentesters are given access to the source code of the software they are analyzing; this corresponds to our ∞ code analysis service. In contrast, a blackbox approach puts a pentester in the shoes of an external attacker having no confidential information like source code or documentation. A greybox approach is somewhat in between white- and black-box: typically the code is unavailable but some information is shared. Grey- and black-box approaches are followed in our ◦ codeless analysis service.


As a rule of thumb, request a whitebox approach for a more thorough analysis with clear coverage, and a grey- or black-box approach for a feel of what an external attacker could do in a defined timeframe.

You’ve seen what we do. Let’s talk about what we can do for you.