Vista Normal

Hay nuevos artículos disponibles. Pincha para refrescar la página.
Hoy — 4 Abril 2025IT And Programming

This Week in Security: Target Coinbase, Leaking Call Records, and Microsoft Hotpatching

4 Abril 2025 at 14:00

We know a bit more about the GitHub Actions supply chain attack from last month. Palo Alto’s Unit 42 has been leading the charge on untangling this attack, and they’ve just released an update to their coverage. The conclusion is that Coinbase was the initial target of the attack, with the open source agentkit package first (unsuccessfully) attacked. This attack chain started with pull_request_target in the spotbugs/sonar-findbugs repository.

The pull_request_target hook is exceptionally useful in dealing with pull requests for a GitHub repository. The workflow here is that the project defines a set of Continuous Integration (CI) tests in the repository, and when someone opens a new Pull Request (PR), those CI tests run automatically. Now there’s an obvious potential problem, and Github thought of it and fixed it a long time ago. The GitHub Actions are defined right in the repository, and letting any pull request run arbitrary actions is a recipe for disaster. So GitHub always uses actions as they are defined in the repository itself, ignoring any incoming changes in the PR. So pull_request_target is safe now, right? Yes, with some really big caveats.

The simplest security problem is that many projects have build scripts in the repository, and those are not considered part of GitHub Actions by GitHub. So include malicious code in such a build script, make it a PR that runs automatically, and you have access to internal elements like organization and repository secrets and access tokens. The most effective mitigation against this is to require approval before running workflows on incoming PRs.

So back to the story. The spotbugs/sonar-findbugs repository had this vulnerability, and an attacker used it to export secrets from a GitHub Actions run. One of those secrets happened to be a Personal Access Token (PAT) belonging to a spotbugs maintainer. That PAT was used to invite a throwaway account, [jurkaofavak], into the main spotbugs repository. Two minutes after being added, the [jurkaofavak] account created a new branch in spotbugs/spotbugs, and deleted it about a second later. This branch triggered yet another malicious CI run, now with arbitrary Github Actions access rather than just access through a build script. This run leaked yet another Personal Access Token, belonging to a maintainer that worked on both the spotbugs and reviewdog projects.

That token had access to create and edit tags in reviewdog/action-setup, a GitHub Action that runs as a dependency for multiple other actions. The attacker created a fork of this repository, added malicious code, and then overwrote the v1 git tag to point to this malicious code. The tj-actions/changed-files ran a CI flow that made use of the malicious reviewdog/action-setup fork, leaking a GitHub token with write permission to tj-actions/changed-files.

The tag override trick does a lot of heavy lifting in this story, and that’s what was used on tj-actions/changed-files too. Another malicious fork, and a specific tag was overridden to point there. The tag chosen was one used in a Coinbase repository. Specifically coinbase/agentkit used the newly malicious tag in one of its workflows. A Coinbase maintainer discovered this, and deleted the targeted workflow, putting an end to the Coinbase-specific attack. At this point, the attacker opted to burn the pilfered access, and pushed malicious code to every tj-actions/changed-files tag. The idea apparently being that there would likely be some interesting secrets that were leaked. It’s also possible this was intended to hide Coinbase as the primary target. Regardless, that’s the widespread attack we’ve already covered, and now you know the rest of the story.

ZendTo: No CVE, No Problem?

ZendTo is a nifty Open Source, web-based file sharing platform. It’s been around for a while, and the release notes from a 2021 release makes reference to a “security fix” with no additional details given. That caught the attention of [Jay] from Project Black. It sounds like a potential vulnerability, but it seems like no CVE was ever assigned, and no further details were given.

Here’s the issue: ZendTo has an anonymous file upload feature on by default. This has a security feature built in, in the form of scanning the uploaded file with ClamAV in a temporary location, before moving the file to its long term storage directory. Part of this process includes the ever lovely exec("/bin/chmod go+r " . $ccfilelist); line. PHP has some footguns to be aware of, and calling exec() with any user-provider input is one of them. And of course, the user-provided tmp_name value is used to construct the $ccfilelist string. Set tmp_name to 1;command, and you’ve got code execution.

There is another outstanding issue, where legacy md5 passwords that happen to begin with 0e will be interpreted as a number in scientific notation. PHP handles some type comparisons a bit weirdly. These scientific notation values all evaluate as 0. Using any password that also evaluates to one of these special “scientific” md5 hashes, and the comparison collapses to 0 == 0. So one out of every 256 users have a trivially bypassed password — if their account was still using a md5 password hash.

So here we have a pair of serious vulnerabilities, though one has limited exposure, with neither being fully disclosed nor given CVEs. What’s the result of this lack of transparency? Old, vulnerable installs of ZendTo are still on the Internet. Without a CVE, there’s much less pressure to update. No CVE doesn’t necessarily mean no vulnerabilities.

Leaking Call Records

Researcher [Evan Connelly] was looking into the Verizon Call Filter iOS app, and found it to be using an interesting web service. The callLogRetrieval endpoint allows a user to look up call logs for their own Verizon number. Authorization is done using JSON Web Tokens (JWT), which included a “sub” field, indicating the phone number the token was authorized to fetch. The request itself also has a field to indicate the number being queried. This particular endpoint uses a JWT for authorization, but returns the information requested in the query field — without comparing the two values. Yes, any customer that could obtain a valid JWT could query the call records of virtually any other Verizon number. While this is particularly bad, Verizon acknowledged it quickly, and rolled a fix out in less than a month.

When Parameterized Queries Aren’t

What’s the single most powerful tool to prevent SQL injection attacks? Easy: Parameterized queries. Write the SQL query ahead of time, the library converts it into native database code, and only then are the user-generated values plugged in. In theory that means those values can never be understood as part of the SQL logic. While there are ways this can still go wrong, the basic approach is sound. But what if a language, like Nim, had a parameterization option that didn’t actually do parameterized queries?

Yes, Nim’s db_postgres module provides the facility to run code like getRow(sql"SELECT username FROM users WHERE username=?;", "user"), which is intended to protect against SQL injection. But, under the hood, it really is just doing string replacement with character escaping, like replacing null characters with \\0. Now consider PostreSQL’s standard_conforming_strings setting, which among other things, removes the backslash as a special character. But if that setting is disabled, the backslash can be used to escape quotes. Nim doesn’t know anything about that behavior. This combination of not-actually-parameterized parameterization, and lack of awareness of the standard_conforming_strings behavior, means that ./poc '\' ' OR user_id=1; --' is once again a potential SQL injection. Whoops.

Oracle: Oh, That Oracle Cloud!

We finally have a bit more insight into what’s going on at Oracle. You probably remember that the company has continually denied a breach into Oracle Cloud. It seems this is a bit of verbal sleight-of-hand, as Oracle has renamed part of their cloud offering to Oracle Cloud Classic. The remaining, current generation service is the Oracle Cloud. Oracle Cloud Classic has suffered the breach, not technically Oracle Cloud.

It’s not clear that this is really all there is to the story, though, as more data is getting released by the attacker, including video of a web meeting from 2019. Oracle has started reaching out to customers and confirmed the breach, though apparently strictly avoiding putting anything in writing.

Microsoft Joins the Hotpatch Game

Enterprise Linux distros have long had support for various forms of live-patching. We even interviewed TuxCare about this feature for FLOSS Weekly a few weeks ago. It seems that Microsoft finally wants in on the fun. Windows 11 Enterprise has in-memory security patching starting with the 24H2 update. This support is strictly for machines with an Enterprise or certain Education Microsoft subscriptions. The Hotpatches will be available for 8 of the 12 monthly security patches, with an enforced quarterly update via traditional updates and a reboot.

Bits and Bytes

Researchers at GreyNoise have noted an uptick in IPs scanning for Palo Alto device login pages for several days in March. The scanning had as many as 20,000 unique IPs hunting for these login interfaces, which suggests a botnet has been tasked with finding these devices. It’s very possible that a threat actor has found a new vulnerability in Palo Alto devices, and is preparing to launch an attack.

And finally, a pair of posts from ZDI caught our attention this week. The first is a dive into how Binary Ninja’s static code analysis can find potential use-after-free vulnerabilities. The second is all about building an electric car simulator, that can actually plug into real electric vehicle charging stations, and actually fool the charger into believing a car is attached. How is this problem approached safely, given the high voltages and amperages involved? Very carefully.

Keep Bears at Bay with the Crackle of 280,000 Volts

Por: Lewin Day
4 Abril 2025 at 11:00

Bears! Are they scared of massive arcs that rip through the air, making a lot of noise in the process? [Jay] from the Plasma Channel sure hopes so, because that’s how his bear deterrent works!

[Jay] calls it the Bear Blaster 5000. Right from the drop, this thing looks like some crazy weapon out of Halo. That’s because it throws huge arcs at 280,000 volts. The basic concept behind it is simple enough—a battery drives a circuit which generates (kinda) low voltage AC. This is fed to the two voltage multipliers which are set up with opposite polarity to create the greatest possible potential difference between the two electrodes they feed. The meaty combination is able to arc across electrodes spaced over four inches apart. It’s all wrapped up in a super-cool 3D printed housing that really shows off the voltage multiplier banks.

 

Given its resemblance to a stun gun, you might think the idea is to jab an attacking bear with it. But the reality is, if the bear is close enough that you could press this device against it, you’re already lunch. [Jay] explains that it’s more about scaring the animal off with the noise and light it produces. We’d certainly take a few steps back if we heard this thing fire off in the woods.

[Jay] does a great job of explaining how the whole setup works, as well as showing off its raw ability to spark. We’ve seen some great builds from [Jay] before, too, like this beefy custom flyback transformer.

A Portable Electronics Workstation

4 Abril 2025 at 08:00

You don’t see them as often as you used to, but it used to be common to see “electronics trainers” which were usually a collection of components and simple equipment combined with a breadboard, often in a little suitcase. We think [Pro Maker_101’s] portable electronics workstation is in the same kind of spirit, and it looks pretty nice.

The device uses a 3D printed case and a custom PC board. There are a number of components, although no breadboard. There is a breakout board for Raspberry Pi GPIO, though. So you could use the screw terminals to connect to an external breadboard. We were thinking you could almost mount one as a sort of lid so it would open up like a book with the breadboard on one side and the electronics on the other. Maybe version two?

One thing we never saw on the old units? An HDMI flat-screen display! We doubt you’d make one exactly like this, of course, but that’s part of the charm. You can mix and match exactly what you want and make the prototyping station of your dreams. Throw in a small portable soldering iron, a handheld scopemeter, and you can hack anywhere.

We’d love to see something like this that was modular. Beats what you could build in 1974.

Playstacean Evolves The PSOne Into The Crab It Was Always Meant to Be

4 Abril 2025 at 05:00
An orange PSOne in the shape of a crab sits next to a large CRT monitor displaying a video game of a person running through what appears to be a park. A Pepsi logo is toward the top of the HUD.

Odd hardware designs crop up in art and renders far more frequently than in the flesh, but console modder [GingerOfOz] felt the need to bring [Anh Dang]’s image of the inevitable carcinization of our gaming consoles to life.

Starting with the image as inspiration, [GingerOfOz] got to work in CAD, creating an entirely new shell for the battered PSOne he adopted for the project. The final product is slightly less curvy than the picture, but some artistic license was necessary to go from the page to the real world.

The enclosure itself looks straightforward, if a bit tedious, but the articulating crab controller is a work of art itself. He could’ve made the arms static or non-functional, but they’re a fully-functional PlayStation controller that can move around just like on your favorite crustacean at the beach, minus the pinching. We love this whimsical take on the console mod which is a breath of salty air to the continuous race to get increasingly complex consoles into handheld form, although there’s certainly nothing wrong with that!

If you’re looking for some other console mods, how about this Apple M1 inside a Wii or getting your old Ouya up-and-running again?

A Proper OS For The Sega Genesis/Megadrive

Por: Jenny List
4 Abril 2025 at 02:00

The console wars of the early 1990s had several players, but the battle that mattered was between Nintendo’s SNES and Sega’s Genesis, or Megadrive if you are European. They are both famous for their games, but in terms of software they can only run what’s on a cartridge. The Genesis has a Motorola 68000 on board though, which is capable of far more than just Sonic the Hedgehog. [EythorE] evidently thinks so, because here’s a port of Fusix, a UNIX-like OS, for the Sega platform.

As it stands, the OS is running on the BlastEm emulator, but given a Sega Saturn keyboard or a modified PC keyboard for the Sega, it could be run on real hardware. What you get is a basic UNIX-like OS with a working shell and the usual UNIX utilities. With 64k of memory to play with this will never be a powerhouse, but on the other hand we’d be curious to see it in a working cartridge.

Meanwhile, if the console interests you further, someone has been into its workings in great detail.


Header: Evan-Amos, CC BY-SA 3.0.

The Weird Way A DEC Alpha Boots

Por: Jenny List
3 Abril 2025 at 23:00

We’re used to there being an array of high-end microprocessor architectures, and it’s likely that many of us will have sat in front of machines running x86, ARM, or even PowerPC processors. There are other players past and present you may be familiar with, for example SPARC, RISC-V, or MIPS. Back in the 1990s there was another, now long gone but at the time the most powerful of them all, of course we’re speaking of DEC’s Alpha architecture. [JP] has a mid-90s AlphaStation that doesn’t work, and as part of debugging it we’re treated to a description of its unusual boot procedure.

Conventionally, an x86 PC has a ROM at a particular place in its address range, and when it starts, it executes from the start of that range. The Alpha is a little different, on start-up it needs some code from a ROM which configures it and sets up its address space. This is applied as a 1-bit serial stream, and like many things DEC, it’s a little unusual. This code lives in a conventional ROM chip with 8 data lines, and each of those lines contains a separate program selectable by a jumper. It’s a handy way of providing a set of diagnostics at the lowest level, but even with that discovery the weirdness isn’t quite over. We’re treated to a run-down of DEC Alpha code encoding, and should you have one of these machines, there’s all the code you need.

The Alpha was so special in the 1990s because with 64-bit and retargetable microcode in its architecture it was significantly faster than its competitors. From memory it could be had with DEC Tru64 UNIX, Microsoft Windows NT, or VMS, and with the last of which it was the upgrade path for VAX minicomputers. It faded away in the takeover by Compaq and subsequently HP, and we are probably the poorer for it. We look forward to seeing more about this particular workstation, should it come back to life.

Teardown of a Scam Ultrasonic Cleaner

Por: Maya Posch
3 Abril 2025 at 20:00

Everyone knows that ultrasonic cleaners are great, but not every device that’s marketed as an ultrasonic cleaner is necessarily such a device. In a recent video on the Cheap & Cheerful YouTube channel the difference is explored, starting with a teardown of a fake one. The first hint comes with the use of the description ‘Multifunction cleaner’ on the packaging, and the second in the form of it being powered by two AAA batteries.

Unsurprisingly, inside you find not the ultrasonic transducer that you’d expect to find in an actual ultrasonic cleaner, but rather a vibration motor. In the demonstration prior to the teardown you can see that although the device makes a similar annoying buzzing noise, it’s very different. Subsequently the video looks at a small ultrasonic cleaner and compares the two.

Among the obvious differences are that the ultrasonic cleaner is made out of metal and AC-powered, and does a much better job at cleaning things like rusty parts. The annoying thing is that although the cleaners with a vibration motor will also clean things, they rely on agitating the water in a far less aggressive way than the ultrasonic cleaner, so marketing them as something which they’re not is very unpleasant.

In the video the argument is also made that you do not want to clean PCBs with an ultrasonic cleaner, but we think that people here may have different views on that aspect.

🔧 Automatically configure your server with Ansible

Hey folks! 👋

I’ve created a small Ansible playbook for automating the initial setup of Linux servers — perfect for anyone spinning up a VPS or setting up a home server.

🔗 GitHub: github.com/mist941/basic-server-configuration

🛠️ What it does:

  • Creates a secure user with SSH key access
  • Disables root login & password authentication
  • Configures UFW firewall with safe defaults
  • Installs and sets up fail2ban
  • Enables unattended security upgrades
  • Syncs time using NTP
  • Installs useful tools like vim, curl, htop, mtr, and more

💬 Why I built this:

I used to manually harden every new VPS or server I set up — and eventually decided to automate it once and for all. If you:

  • run self-hosted services,
  • want a safe and quick VPS setup,
  • or want to get started with Ansible

this playbook might save you time and effort.

🚀 Contributing:

I’ve created a few good first issues if anyone wants to contribute! 🤝
Feedback, PRs, or even just a ⭐ would be hugely appreciated.

submitted by /u/RipKlutzy2899
[link] [comments]

rate my rig

rate my rig

This is my poor brazilian 🇧🇷 homelab. This laptop survived a lover's quarrel of my neighbors, and they give it to me. Here I have Immich, NextCloud, Portainer, Nginx Proxy Manager and a few other things. My main goal with this old and broken laptop is to get away from paid subscriptions from Google. Now I am planning to install Jellyfin to selfhost my own media server.

Specs:
Celeron 847
4gb ddr3 1333mhz
120gb chinese 🇨🇳 ssd
500gb wd hdd

submitted by /u/Felps2001
[link] [comments]

MAZANOKE update (image optimizer via browser): Batch upload and download

MAZANOKE update (image optimizer via browser): Batch upload and download

Thank you for the support that I've received during the launch of MAZANOKE—a self-hosted local image optimizer that runs in your browser! It can run offline and is installable as a web app too.

This week, I've been addressing the feature that has been a bottleneck for the usability of an image optimizer, namely: batch upload and download.

Project page: https://github.com/civilblur/mazanoke

Highlights v1.0.1 (view release note)

  • Upload multiple files simultaneously
    • Images are processed one at a time to prevent excessive browser resource usage.
  • Download all optimized images as a zip file.
    • Files over 1GB are split into multiple zip files.
    • Large downloads may take time, depending on hardware and browser.
  • Option to clear optimized images from the "Images" section.
  • Convert GIF and SVG to PNG.
    • GIF-to-GIF optimization is not supported.
    • SVG optimization is not planned.
submitted by /u/humming6
[link] [comments]

🌴 Palmr. - Open-Source File Transfer | Self-Hosted Alternative to WeTransfer

🌴 Palmr. - Open-Source File Transfer | Self-Hosted Alternative to WeTransfer

Hey everyone! 👋

We’re excited to introduce Palmr., a self-hosted, open-source file transfer solution designed as a flexible alternative to WeTransfer, SendGB, and others. 🚀

Why Palmr.?

Self-hosted – Deploy on your own server or VPS for full control.
Privacy-focused – No third-party dependencies, ensuring your data stays yours.
No artificial limits – Share files with no hidden restrictions or fees.
Modern & Fast – Built with Fastify, React, PostgreSQL, and MinIO for high performance.

Tech Stack

  • Backend: Fastify (Node.js) + PostgreSQL + MinIO
  • Frontend: React + TypeScript + Vite
  • Storage: AWS S3-compatible MinIO

Check it out on GitHub and join the community! 🌍
🔗 GitHub: github.com/kyantech/Palmr
🔗 Docs: palmr-docs.kyantech.com.br

Would love to hear your feedback and see how you use it!

submitted by /u/Livid_Individual3656
[link] [comments]

This Week in Self-Hosted (4 April 2025)

Happy Friday, r/selfhosted! Linked below is the latest edition of This Week in Self-Hosted, a weekly newsletter recap of the latest activity in self-hosted software and content.

This week's features include:

  • Plex's new mobile app redesign
  • Ghost CMS's officially entrance into the fediverse
  • Software updates and launches
  • A spotlight on BookLore (u/WorldTraveller101) -- a self-hosted book collection management and reading platform
  • A ton of great guides, videos, and content from the community

Thanks, and as usual, feel free to reach out with feedback!


This Week in Self-Hosted (4 April 2025)

submitted by /u/shol-ly
[link] [comments]

280+ open source MCP tools to use with LLMs

280+ open source MCP tools to use with LLMs

2 years ago, we launched Activepieces as an open source automation tool. Ever since we got 280+ pieces (apps) of which 60% contributed by the community (we’re so grateful!).

With the LLM hype and with the increasing popularity of MCPs, we decided to create some tooling around these pieces to make them available as MCP tools.

This means you can set up Activepieces, connect some of these tools, get an MCP URL, pass it to your LLM (through an MCP client like Claude Desktop, Cursor or Windsurf), and start giving actionable tasks to the LLM!

It’s so powerful as you can ask AI things like:

  • Cancel all my meetings tomorrow.
  • What tasks should I do today?
  • Write a tweet and post it.

This is how the MCP Server will look in your Activepieces instance:

Links:

submitted by /u/ashthesam
[link] [comments]

How badly secure is my setup and what are some recommendations for it to be secured better?

  • Have a Raspberry Pi 5 running some applications like Immich, paperless ngx homepage etc using docker compose.
  • Purchased a cloudflare cheap domain.
  • Setup a cloudflared tunnel from my pi for access to the apps. Created CNAME record on Cloudflare dashboards.

Enabled Full Strict and use HTTPS certs and stuff like that on Cloudflare dashboard.

submitted by /u/cowcorner18
[link] [comments]

When AI attacks with Xe Iaso - Self-Hosted podcast

Hello there r/selfhosted! Been a while since I shared an episode here as posting every time you release a thing gets old fast. But, this week we have an episode that is really pretty useful for self-hosters. How to avoid getting DDOSd by AI scrapers by “weighing the soul” of every visitor to your site with Anubis.

Thanks for listening! Alex

——————

AI companies are rewriting the social contract, scraping first and asking for forgiveness later.

Xe Iaso is fighting back and we spoke to them on this weeks Self-Hosted podcast.

https://selfhosted.show/146

submitted by /u/Ironicbadger
[link] [comments]

How do you keep track of your servers, software and docker stacks?

Hi, I was wondering how everyone keeps track of their server hardware, the software and other services you are running on there. I was taking a look at upgrading some memory in my server and realized that I had no idea what the memory in the machine was, so thought it might be smart to document some of that stuff.

How do you guys keep track of these things? Do you have an internal wiki, a git repo or just a piece of paper or whatever? Curious to hear everyone's systems.

submitted by /u/LegoRaft
[link] [comments]

Just released Erugo v0.1.1 - A self-hosted secure file sharing platform

Just released Erugo v0.1.1 - A self-hosted secure file sharing platform

https://preview.redd.it/yg7du4fcaose1.png?width=1920&format=png&auto=webp&s=dd4ea51f58eceaa110000e0f43ee44b996006120

Hi Fellow Self-hosters!

For those who haven't heard of it, Erugo is a powerful, self-hosted file-sharing platform I've been working on. It's designed as a secure alternative to services like WeTransfer, giving you complete control over your data while providing an elegant user experience for both senders and recipients.

It's built with PHP/Laravel and Vue.js, and deploys easily via Docker. Erugo generates human-friendly share links (like yourdomain.com/shares/quiet-cloud-shrill-thunder) and offers flexible configuration options to match your needs.

I just released version 0.1.1 with some exciting new features:

🔐 Password Protection

Users can now password-protect their shares, adding an extra layer of security for sensitive files. Protected shares cannot be accessed or downloaded without the correct password.

📁 Folder Support

You can now upload entire folders (via drag-and-drop or the "Add Folders" button), and Erugo will maintain the complete folder structure in the downloaded zip file. This makes it much easier to share complex project directories.

⏱️ Custom Expiry Times

Users can set specific expiration times when creating shares, while admins can configure maximum and default expiration periods. This gives you greater flexibility for time-sensitive content.

📧 Email Template Management

Administrators can now easily edit all email templates and subjects directly from the admin panel, making it simple to customise notifications and maintain consistent branding.

🔢 Improved Versioning

I've switched to semantic versioning (SemVer) from my previous custom system, providing clearer indication of major, minor, and patch release

Getting Started

Erugo is incredibly easy to deploy. Just use the example docker-compose.yaml:

services: app: image: wardy784/erugo:latest restart: unless-stopped volumes: - ./erugo-storage:/var/www/html/storage # Use a dedicated folder ports: - "9998:80" 

Then run:

docker compose up -d 

Existing users can update with:

docker pull wardy784/erugo:latest docker-compose up -d 

Links

If you have any questions or feedback, feel free to ask! I'm actively developing Erugo and always looking to improve it.

submitted by /u/PromaneX
[link] [comments]

Best self hosted web/mobile music streamer for own music library

Hey thinking of starting again buying music to support musicians I love. With that I will need something to replace my Spotify player, And given that I do have a NAS that can run things... I'd love to simply self host.

What is the closest we can get to Spotify/Apple Music level of UX with our own music? Especially a good mobile player will be key.

submitted by /u/Final_Alps
[link] [comments]

Input wanted for a Self-Hosted Teacher Accounting App (Future Open Source Project!)

Hey, r/selfhosted

I’m developing a self-hosted app aimed at simplifying accounting and administrative tasks for private teachers (think music tutors, language instructors, etc.), and I’d love your ideas and feedback!

My fiancée is a private English teacher here in Brazil, and I’ve watched her juggle spreadsheets, sticky notes, and chaotic WhatsApp reminders to track student payments, invoices, and schedules. Existing tools are either too generic, too expensive, or lack features tailored to small-scale educators. So… I’m building something better—and eventually open source!

What I envision:

  • Track students, classes, schedules, and payment status.
  • Visual reminders for overdue payments, income reports, and payment history.
  • Generate invoices/receipts (with support for tax related documents, e.g., Brazilian "nota fiscal") automatically.

Where I Need Help:

  1. Feature Ideas. I mean, are there other apps with this in mind? What's missing in them?
  2. Would calendar sync (Google/Outlook), messaging (WhatsApp/Email templates), or tax APIs be useful?
  3. What deployment options (Docker, Kubernetes), databases, or auth methods (OAuth, LDAP) should I prioritize?
  4. MOST IMPORTANTLY: If you’re a teacher/tutor, what frustrates you about managing admin work?
  5. Would you contribute? Any preferences for stack (leaning toward Java/SpringBoot + React)?
  6. Is there any way to make this profitable even with it being open source? I'm a poor person from a poor country and I'd love a way to make money, but I would never give up on it being OSS.

Sorry for all these questions... This is super early stage, so all ideas are welcome—even “that’s dumb, that's a terrible idea do this instead” feedback! The goal is to build a community-driven tool to help educators.

TL;DR: Building a OSS self-hosted app to help teachers manage students, payments, and invoices. What features/tech would you want?

(Thanks for reading—my fiancée already approves of anything that reduces her spreadsheet time 😅)

submitted by /u/BrotherInsane997
[link] [comments]
❌
❌