Project ideas from Hacker News discussions.

My first patch to the Linux kernel

📝 Discussion Summary (Click to expand)

Key Themesfrom the Discussion

1. Unwritten rules and gate‑keeping slow down contributions

“The first one always takes way longer than the code itself deserves. Most of the work is figuring out the unwritten rules, not writing the patch.” — aswinnair99
“I think this is how large BFDL‑style open source projects slowly become less and less relevant over the next few decades.” — fooker

2. Undefined behavior in low‑level C expressions, especially shifts> “The result of E1 << E2 is E1 left‑shifted E2 bit positions; vacated bits are filled with zeros. If E1 has a signed type and non‑negative value, and E1×2^E2 is representable in the result type, then that is the resulting value; otherwise, the behavior is undefined.” — ngburke

3. Explicit codification of “tribal” knowledge and AI’s role

“This will likely be alleviated when AI first projects take over as important OSS projects. On a more general note… the ‘engineer‑to‑company can not afford to lose’ is likely losing its moat entirely.” — tossandthrow
“Fir these projects everything ‘tribal’ has to be explicitly codified.” — tossandthrow


🚀 Project Ideas

Generating project ideas…

[OpenNorms — Community‑driven Rulebook for Open Source Contribution]

Summary

  • [Capture unwritten contribution norms into an evolving, community‑voted checklist that onboards newcomers.]
  • [Reduce gatekeeping friction by making hidden rules explicit and searchable.]

Details

Key Value
Target Audience Open‑source maintainers, contributors, newcomers
Core Feature Interactive rulebook generation + auto‑generated contributor guide
Tech Stack Node.js (Express), React front‑end, PostgreSQL, GitHub API integration
Difficulty Medium
Monetization Hobby

Notes

  • [HN commenters often lament “unwritten rules”; they’d adopt a tool that surfaces them.] - [Can be bundled with existing project docs or as a standalone onboarding portal, boosting PR acceptance rates.]

[ShiftGuard — C Shift‑Safety Linter & Analyzer]

Summary

  • [Detect unsafe bit‑shift, sign‑extension, and implicit signed/unsigned conversions at compile‑time.]
  • [Provide explanatory reports that map errors to the C standard clauses.]

Details

Key Value
Target Audience C developers, maintainers of low‑level firmware, OSS projects
Core Feature Static analysis plugin for GCC/Clang + rule library for shift safety
Tech Stack LLVM‑based plugin (C++), Python CLI wrapper, JSON output
Difficulty High
Monetization Hobby

Notes

  • [Commenters like “adrian_b” stress that implicit conversions must be forbidden; they’d welcome a linter that enforces it.] - [Integrates into CI pipelines, catching UB early and improving kernel merge success.]

[NonNegType — Annotated Non‑Negative Integer Types for C]

Summary

  • [Introduce a lightweight attribute / typedef that distinguishes non‑negative integers from generic unsigned, forcing explicit casts.]
  • [Prevent implicit signed/unsigned conversions that lead to undefined behavior.]

Details

Key Value
Target Audience C library authors, safety‑critical developers, language tooling enthusiasts
Core Feature Header providing _NonNeg int macro and compiler attribute checking, plus optional static analysis bindings
Tech Stack C preprocessor extensions, Clang static analyzer plugin, optional Python config generator
Difficulty Medium
Monetization Revenue-ready: Subscription

Notes

  • [HN users discuss “unsigned used for non‑negative ints” and want language fixes; they'd adopt a pragmatic solution.] - [Can be packaged as a drop‑in library, easing migration and enabling stricter code‑quality policies.]

Read Later