logoalt Hacker News

Cal.com is going closed source

187 pointsby Benjamin_Dobellyesterday at 3:26 PM148 commentsview on HN

Comments

simonwyesterday at 3:46 PM

Drew Breunig published a very relevant piece yesterday that came to the opposite conclusion: https://www.dbreunig.com/2026/04/14/cybersecurity-is-proof-o...

Since security exploits can now be found by spending tokens, open source is MORE valuable because open source libraries can share that auditing budget while closed source software has to find all the exploits themselves in private.

> If Mythos continues to find exploits so long as you keep throwing money at it, security is reduced to a brutally simple equation: to harden a system you need to spend more tokens discovering exploits than attackers will spend exploiting them.

show 13 replies
ryanleesipesyesterday at 10:38 PM

Head of Thunderbird project here.

Our scheduling tool, Thunderbird Appointment, will always be open source.

Repo here: https:// github.com/thunderbird/appointment

Come talk to us and build with us. We'll help you replace Cal.com

show 1 reply
ButlerianJihadyesterday at 3:40 PM

This seems kind of crazy. If LLMs are so stunningly good at finding vulnerabilities in code, then shouldn't the solution be to run an LLM against your code after you commit, and before you release it? Then you basically have pentesting harnesses all to yourself before going public. If an LLM can't find any flaws, then you are good to release that code.

A few years ago, I invoked Linus's Law in a classroom, and I was roundly debunked. Isn't it a shame that it's basically been fulfilled now with LLMs?

https://en.wikipedia.org/wiki/Linus%27s_law

show 9 replies
Tepixyesterday at 8:08 PM

Hey cal.com, as a potential customer, you have just lost me. Open source is set to profit from improved transparency in the SSDLC. With closed source, you will have to trust the software vendor instead.

I'm not sure I agree with Drew Breunig, however. The number of bugs isn't infinite. Once we have models that are capable enough and scan the source code with them at regular intervals, the likelihood of remaining bugs that can be exploited goes way down.

gouthamveyesterday at 3:31 PM

This is a weird knee-jerk reaction. I feel like this is more a business decision than a security decision.

I feel like with AI, self-hosting software reliably is becoming easier so the incentives to pay for a hosted service of an OSS project are going down.

show 4 replies
doytchyesterday at 3:32 PM

I get the mentality but it feels very much like security through obscurity. When did we decide that that was the correct model?

show 3 replies
tudorgyesterday at 4:02 PM

It's funny that this news showed up just as we (Xata) have gone the other direction, citing also changes due to AI: https://xata.io/blog/open-source-postgres-branching-copy-on-...

We did consider arguments in both directions (e.g. easier to recreate the code, agents can understand better how it works), but I honestly think the security argument goes for open source: the OSS projects will get more scrutiny faster, which means bugs won't linger around.

Time will tell, I am in the open source camp, though.

amazingamazingyesterday at 11:37 PM

this is a big nothing. they relicensed the previous cal.com as cal.diy (MIT by the way, instead AGPL or something else) and effectively forked their own product into the "new" cal.com. anyone who cares would just use cal.diy as they were prior to this announcement with cal.com

show 1 reply
alanceyesterday at 11:26 PM

I only found cal.com in the first place because I searched for an open source calendly alternative.

com2kidyesterday at 9:24 PM

Proposition 1: The majority of a code in a modern app is from shared libraries

Proposition 2: The most popular shared libraries are going to be quickly torn apart by LLM security tools to find vulnerabilities

Proposition 3: After a brief period of mass vulnerability discovery, the overall quality of shared libraries will dramatically increased.

Conclusion: After the initial wave of vulnerabilities has passed, the main threat to open source code bases is in their own comparatively small amount of code.

iancarrollyesterday at 3:59 PM

I know plenty of security researchers who exclusively use Claude Code and other tools for blackbox testing against sites they don’t have the source code for. It seems like shutting down the entire product is the only safe decision here!

egorfineyesterday at 10:31 PM

What's preventing cal.com to run the AI researcher over their own codebase and find their vulnerabilities before anyone else and patch them all by tomorrow morning?

That's right. Nothing.

aboundyesterday at 7:08 PM

This certainly makes me feel better about the project I started a few months ago to replace my Cal.com instance with a smaller, simpler self-hosted tool

https://git.sr.ht/~bsprague/schedyou

mellosoulsyesterday at 9:53 PM

The founder proclaimed "Open Source is Dead" in the original tweet.

I thought this was grandiose and projecting their own weakness onto others, an extremely unappealing marketing position that may get clicks in the short term but will undermine trust beyond that.

_pdp_yesterday at 3:57 PM

The real threat is not security but bad actors copying your code and calling it theirs.

IMHO, open source will continue to exist and it will be successful but the existence of AI is deterrent for most. Lets be honest, in recent times the only reason startups went open source first was to build a community and build organic growth engine powered by early adaptors. Now this is no longer viable and in fact it is simply helping competitors. So why do it then?

The only open source that will remain will be the real open source projects that are true to the ethos.

show 2 replies
smetannikyesterday at 10:50 PM

This sounds more like a good excuse to go closed source. I feel that real reason might be revenue-related.

notnullorvoidyesterday at 8:56 PM

Security through obscurity can be a good security layer, but you need to maintain obscurity. That's a lot harder than Cal.com seems to realize.

For example using something like Next.js means a very large chunk of important obscurity is thrown out the window. The same for any publicly available server/client isomorphic framework.

dangyesterday at 8:36 PM

Related ongoing threads:

Open Source Isn't Dead - https://news.ycombinator.com/item?id=47780712

Cybersecurity looks like proof of work now - https://news.ycombinator.com/item?id=47769089

andsoitisyesterday at 3:28 PM

> Today, we are making the very difficult decision to move to closed source, and there’s one simple reason: security.

It seems like an easy decision, not a difficult one.

woodruffwyesterday at 3:47 PM

Today, it's easy to (publicly) evaluate the ability of LLMs to find bugs in open source codebases, because you don't need to ask permission. But this doesn't actually tell us the negative statement, which is that an LLM won't just as effectively find bugs in closed codebases, including through black-box testing, reverse engineering, etc.

If the null hypothesis is that LLMs are good at finding bugs, full stop, then it's unclear to me that going closed actually does much to stop your adversary (particularly as a service operator).

codegeekyesterday at 8:19 PM

I am beyond convinced at this point that you either run an Open Source Project with a small revenue company (single digit millions) or run a software company that does more than 10M ARR at the least and be closed source. I know there are exceptions but most open source Software companies are providing code with heavy restrictions or teaser features and gate keep everything in their "ee/enterprise" version etc.

sadeshmukhyesterday at 11:36 PM

Security by obscurity has never been real.

axeldunkelyesterday at 9:34 PM

Sounds like "security by obscurity" to me - if you think AI is so good at finding security issues - it will find them in compiled code as well. Why not using it in your favor and let it search for bugs you'd otherwise not find?

show 1 reply
theturtletalksyesterday at 11:52 PM

Enshittification has come for VC backed open-source. AI has deemed commercial open source obsolete especially when users can point Calude Code to calcom on GitHub and ask it to make them scheduling features directly into their product. That’s what spooked Cal.

constantlmyesterday at 10:41 PM

Security through obscurity isn't a great strategy.

bearsyankeesyesterday at 3:50 PM

Think this is a bad, bad move...

https://news.ycombinator.com/item?id=47780712

evanjrowleyyesterday at 4:08 PM

Juxtapose this with the fact that many HNers will decry strong copyleft FOSS licenses as not being truly "open source" - the reality is that closed source software is still full of open-source non-copyleft dependencies. Unless you're rolling your own encryption and TCP stack, being closed source will not be the easy solution that many imagine it to be.

neuroelectronyesterday at 11:44 PM

Chatgpt, write me a reason to make more money as a tech ceo.

Charge for api access, take a cut of the extensions economy.

How do i do that, I'm open source?

lrvickyesterday at 9:55 PM

There are endless closed calendar options. Cal.com being FOSS and not making us feel locked in forever was the only reason we chose it over wasting limited cycles self hosting this at Distrust and Caution.

AI can clone something like cal.com with or without source code access, so in trying to pointlessly defend against AI they are just ruining the trust they built with their customers, which is the one thing AI can never create out of thin air.

We exclusively run our companies with FOSS software we can audit or change at any time because we work in security research so every tool we choose is -our- responsibility.

They ruined their one and only market differentiator.

We will now be swapping to self hosting ASAP and canceling our subscriptions.

Really disappointing.

Meanwhile at Distrust and Caution we will continue to open source every line of code we write, because our goal is building trust with our customers and users.

wqtzyesterday at 8:31 PM

In my advisory job founders always raise the question about open sourcing within the first hour of meeting me. They think that open sourcing product means transparency and developer trust which helps with early adoption. Every single founder I talked to brings up open source as a market penetration method to drive the initial adoption.

I always say to just stop with the virtue signaling led sales technique.

I despise the "we are like the market leader of our niche but open source" angle. Developer as a buyer and as a community these days in my opinion do not care about open source anymore. There is no long term value to that. The moment a product gets traction the open source elements is a constant mild headache as open source product means that they have no intellectual copyright on the core aspect of the product and it is hard to raise money or sell the company. And whenever a product gets traction they will take any excuse to make it close source again. With an open source product they are just coasting on brand. Regardless of what your personal opinion is, this has been largely true for most for-profit business.

Open source is largely is nothing more then a branding concept for a company who is backed by investors.

CamperBob2yesterday at 11:19 PM

Today, AI can be pointed at an open source codebase and systematically scan it for vulnerabilities.

AI also goes a long way towards erasing the distinction between source code and executable code. The disassembly skill of a good LLM is nothing short of jaw-dropping.

So going closed-source may be safer for SaaS, but closing the source won't save a codebase from being exploited if the binaries are still accessible to the public. In that sense, instead of dooming SaaS as many people have suggested AI will do, it may instead be a boon.

jemiluv8yesterday at 10:44 PM

I have fond memories of this project. Contributing to it really helped me ramp up my dev skills and was effectively my introduction to monorepo’s in JavaScript. It was the kind of codebase I couldn’t get my hands on while working in my part of the world. Good luck going closed source.

adamtaylor_13yesterday at 4:00 PM

Could you not simply point AI at your open source codebase and use it to red-team your own codebase?

This post's argument seems circular to me.

asdevyesterday at 3:56 PM

Who even uses their open source product?

poisonborzyesterday at 5:03 PM

AI sure is useful as a scapegoat for any negative PR inducing moves.

aizkyesterday at 8:44 PM

Sounds backwards to me.

analogpixelyesterday at 7:32 PM

TIL I learned about yet another calendar application I don't need. Someone should setup their openclaw to just write a new todo/calendar app each week; they'll be billionaires by the end of the year.

nativeityesterday at 3:56 PM

I guess why fix vulnerabilities when you can just obscure them?

post-ityesterday at 8:18 PM

- You know, Lindsay, as a software engineering consultant, I have advised a number of companies to explore closing their source, where the codebase remains largely unchanged but secure through obscurity.

- Well, did it work for those companies?

- No, it never does. I mean, these companies somehow delude themselves into thinking it might, but... but it might work for us.

xnxyesterday at 5:36 PM

Saaspocalypse is coming for cal.com

behringeryesterday at 9:33 PM

Security via obscurity and you get to blame AI too! What a win for their marketing team.

fontainyesterday at 6:22 PM

Monumentally dumb given their codebase is already public and the type of security issues that exist in software are usually found in the oldest code. But also, and more importantly, cal.com launched coss.com last year, open source is (ostensibly) their DNA. How could they do a complete 180 on something so fundamental and think that wouldn’t worry customers, much more so than their codebase being public? I cannot even begin to understand this. Surely there must be more to the story?

show 2 replies
barelysapientyesterday at 3:57 PM

I hate how this sounds...but this reads to me "we lack the confidence in our code security so we're closing the source code to conceal vulnerabilities which may exist."

creatonezyesterday at 3:53 PM

This is some truly exceptionally clownish attention seeking nonsense. The rationale here is complete nonsense, they just wanted to put "because AI" after announcing their completely self-serving decision. If AI cyber offense is such a concern, recognize your role as a company handling truckloads of highly sensitive information and actually fix your security culture instead of just obscuring it.

show 1 reply
hmokiguessyesterday at 4:00 PM

Risk tolerance and emotional capacity differs from one individual to another, while I may disagree with the decision I am able to respect the decision.

That said, I think it’s important to try and recognize where things are from multiple angles rather than bucket things from your filter bubble alone, fear sells and we need to stop buying into it.

righthandyesterday at 7:14 PM

Good for them. I’m sure they saw the writing on the wall when Monday.com was cloned. This is the right move.

righthandyesterday at 4:07 PM

This is the future now that AI is here. Publishing is going to be dead, look at the tea leaves, how many engineers are claiming they don’t use package managers anymore and just generate dependencies? 5 years and no one will be making an argument for open source or blogging.

🔗 View 5 more comments