B
IoT Vulnerability Scanner
3.25
Derivation Chain
Step 1
IoT device security vulnerabilities (robot vacuum hacking)
→
Step 2
IoT security audit services
→
Step 3
Pre-launch automated vulnerability scanning tool for SME IoT manufacturers
Problem
Small and mid-sized Korean IoT manufacturers (robot vacuums, smart home devices, etc.) face costs of $3,750–$15,000 and 2–4 week timelines when outsourcing pre-launch security vulnerability assessments to external security firms. As KC certification security requirements continue to tighten, companies without in-house testing capabilities experience launch delays, and hacking incidents (e.g., 7,000 robot vacuums compromised) can result in recall/litigation costs reaching hundreds of thousands of dollars.
Solution
A SaaS that automatically scans uploaded IoT firmware binaries for known CVE matches, default credential detection, and communication protocol vulnerabilities. (1) Static analysis of firmware binaries, (2) automated matching against known vulnerability databases (NVD/KISA), (3) KC/KCMVP certification requirement checklist Report generation.
NUMR-V Scores
NUMR-V Scoring System
| N Novelty | 1-5 | How uncommon the service is in market context. |
| U Urgency | 1-5 | How urgently users need this problem solved now. |
| M Market | 1-5 | Market size and growth potential from proxy indicators. |
| R Realizability | 1-5 | Buildability for a small team with realistic constraints. |
| V Validation | 1-5 | Validation signal quality from competition and demand data. |
SaaS N=.15 U=.20 M=.15 R=.30 V=.20
Senior N=.25 U=.25 M=.05 R=.30 V=.15
Feasibility (57%)
Data Availability
20.6/25
Feasibility Breakdown
| Tech Complexity | / 40 | Difficulty of core implementation stack. |
| Data Availability | / 25 | Practical availability and cost of required data. |
| MVP Timeline | / 20 | Expected time to ship a usable MVP. |
| API Bonus | / 15 | Bonus for viable public API leverage. |
Market Validation (54/100)
Validation Breakdown
| Competition | / 20 | Signal quality from competitor landscape. |
| Market Demand | / 20 | Demand proxies from search and mention patterns. |
| Timing | / 20 | Fit with current shifts in tech, behavior, and regulation. |
| Revenue Signals | / 15 | Reference evidence for monetization viability. |
| Pick-Axe Fit | / 15 | How well the concept serves participants in a trend. |
| Solo Buildability | / 10 | Practicality for lean-team implementation. |
Technical Requirements
Backend [high]
Data Pipeline [medium]
Frontend [low]