Proof of Usefulness Report

Codean

Analysis completed on 1/18/2026

+49
Proof of Usefulness Score
You're In Business

The project 'Codean' (submitted as DeepHunter) is a verifiable security review platform based in the Netherlands with seed funding (~$400k) and a specialized product for pentesters. However, the submission quality is extremely poor, containing false claims ('most people have used my product'), incorrect revenue data, and a mismatch in project naming. While the real-world utility for security experts is high, the PoU score is heavily penalized by the lack of credible evidence provided in the submission and the false reach claims.

Ready to Compete for $150k+ in Prizes?

Move this data into a HackerNoon blog draft to become eligible for your share of $150k+ in cash and software prizes

View All Reports

Score Breakdown

Real World Utility+18
Audience Reach Impact+2
Technical Innovation+11
Evidence Of Traction+5
Market Timing Relevance+6
Functional Completeness+0
Subtotal+43
Usefulness Multiplierx1.12
Final Score+48

Project Details

Project URL
Description
Software is getting more complex, the amount of criminal hackers is growing, and automatic tools for software engineers are not good enough. Human software security experts are just irreplaceable. But… they could use a hand. That is why we built our 'review environment'.\n​The review environment supersedes the IDE for security experts: because it is optimized for security code review. We help security experts work 2x faster; up to 10x for specific tasks.\n\nCodean review environment: \nOur review environment is a SaaS solution for whitebox pentesters, security auditors, and everyone else who wants to deliver higher review quality in less time.\nFeatures range from keeping track what is reviewed while doing delta's, to symbiotic taint analysis, to easy report composition. The result: less mundane work, more fun.\n\nPentest 2.0: \nWe also have a team of security analysts ourselves, who help software developers with pentests and security review.\nWith the review environment we are able to deliver higher quality for a lower budget. And we can easily perform continuous security review, which fits way better with with your agile workflow: see it as a security engineer who (parttime) joins your team.
Audience Reach
everyone
Target Users
everyone
Technologies
Cloud Computing, Software Development, Saas
Traction Evidence
most people have used my product

Algorithm Insights

Market Position
Growing utility with room for optimization
User Engagement
Documented reach suggests active user community
Technical Stack
Modern tech stack aligned with sponsor technologies

Recommendations to Increase Usefulness Score

Document User Growth

Provide specific metrics on user acquisition and retention rates

Showcase Revenue Model

Detail sustainable monetization strategy and current revenue streams

Expand Evidence Base

Include testimonials, case studies, and third-party validation

Technical Roadmap

Share development milestones and feature completion timeline