logoalt Hacker News

Cal.com is going closed source

315 pointsby Benjamin_Dobellyesterday at 3:26 PM241 commentsview on HN

Comments

simonwyesterday at 3:46 PM

Drew Breunig published a very relevant piece yesterday that came to the opposite conclusion: https://www.dbreunig.com/2026/04/14/cybersecurity-is-proof-o...

Since security exploits can now be found by spending tokens, open source is MORE valuable because open source libraries can share that auditing budget while closed source software has to find all the exploits themselves in private.

> If Mythos continues to find exploits so long as you keep throwing money at it, security is reduced to a brutally simple equation: to harden a system you need to spend more tokens discovering exploits than attackers will spend exploiting them.

show 13 replies
ryanleesipesyesterday at 10:38 PM

Head of Thunderbird project here.

Our scheduling tool, Thunderbird Appointment, will always be open source.

Repo here: https:// github.com/thunderbird/appointment

Come talk to us and build with us. We'll help you replace Cal.com

show 3 replies
ButlerianJihadyesterday at 3:40 PM

This seems kind of crazy. If LLMs are so stunningly good at finding vulnerabilities in code, then shouldn't the solution be to run an LLM against your code after you commit, and before you release it? Then you basically have pentesting harnesses all to yourself before going public. If an LLM can't find any flaws, then you are good to release that code.

A few years ago, I invoked Linus's Law in a classroom, and I was roundly debunked. Isn't it a shame that it's basically been fulfilled now with LLMs?

https://en.wikipedia.org/wiki/Linus%27s_law

show 9 replies
Nukahahatoday at 10:27 AM

Isn't the joke that everything is open source if you can read assembly? Pretty sure someone is working on an AI that reads assembly... Not sure hiding the codebase away is a viable solution!

show 1 reply
gouthamveyesterday at 3:31 PM

This is a weird knee-jerk reaction. I feel like this is more a business decision than a security decision.

I feel like with AI, self-hosting software reliably is becoming easier so the incentives to pay for a hosted service of an OSS project are going down.

show 4 replies
Tepixyesterday at 8:08 PM

Hey cal.com, as a potential customer, you have just lost me. Open source is set to profit from improved transparency in the SSDLC. With closed source, you will have to trust the software vendor instead.

I'm not sure I agree with Drew Breunig, however. The number of bugs isn't infinite. Once we have models that are capable enough and scan the source code with them at regular intervals, the likelihood of remaining bugs that can be exploited goes way down.

diebillionairestoday at 3:08 AM

Lame. "We don't want AI pointed at our code so we're going closed source". That's hilarious and a cover up.

show 1 reply
theahuratoday at 2:13 AM

I'm sorta suspicious. I don’t really think this is why they are moving to closed source. It’s true that there is more security risk, but that actually justifies being open source, because open source tooling can spend more tokens hardening itself against security vulns than closed source tooling (at least, that’s the theory). My strong hunch is they are moving to closed source because it is now trivial to copy a product with AI clean rooms. Which, tbf, is a totally valid reason to move closed source. But I'd want to see more adoption of something like the Ship of Theseus license (https://github.com/tilework-tech/nori-skillsets/pull/465/cha...) before giving up on open source entirely

show 1 reply
doytchyesterday at 3:32 PM

I get the mentality but it feels very much like security through obscurity. When did we decide that that was the correct model?

show 3 replies
opemtoday at 3:31 AM

> When we started Cal.com, we believed deeply in open source.

No you certainly didn't, otherwise you shouldn't have come up with such a meaningless excuse!

tudorgyesterday at 4:02 PM

It's funny that this news showed up just as we (Xata) have gone the other direction, citing also changes due to AI: https://xata.io/blog/open-source-postgres-branching-copy-on-...

We did consider arguments in both directions (e.g. easier to recreate the code, agents can understand better how it works), but I honestly think the security argument goes for open source: the OSS projects will get more scrutiny faster, which means bugs won't linger around.

Time will tell, I am in the open source camp, though.

sgbealtoday at 5:37 AM

> Today, we are making the very difficult decision to move to closed source, and there’s one simple reason: security.

(Enter name of large software vendor here) has long-since proven that security through obscurity is not a real thing.

eloisanttoday at 9:39 AM

This reads like a post from 1995.

"But if everyone can read the source code, they'll be able to find vulnerabilities more easily!"

No. Security by obscurity has proven wrong.

iancarrollyesterday at 3:59 PM

I know plenty of security researchers who exclusively use Claude Code and other tools for blackbox testing against sites they don’t have the source code for. It seems like shutting down the entire product is the only safe decision here!

aboundyesterday at 7:08 PM

This certainly makes me feel better about the project I started a few months ago to replace my Cal.com instance with a smaller, simpler self-hosted tool

https://git.sr.ht/~bsprague/schedyou

_pdp_yesterday at 3:57 PM

The real threat is not security but bad actors copying your code and calling it theirs.

IMHO, open source will continue to exist and it will be successful but the existence of AI is deterrent for most. Lets be honest, in recent times the only reason startups went open source first was to build a community and build organic growth engine powered by early adaptors. Now this is no longer viable and in fact it is simply helping competitors. So why do it then?

The only open source that will remain will be the real open source projects that are true to the ethos.

show 2 replies
abusedmediatoday at 8:54 AM

The article is leaking from all sides. As a wannabe hacker would find a hole in a public repo, what can the repo owner do, who knows every detail of the project and has a high interest in it, also economically?

usernametaken29today at 2:41 AM

Just a random thought. Up until yesterday this project was open source. The code base won’t be rewritten tomorrow. More likely is that conserved parts of the source code, something like 90% will just remain the same. Particularly the core database schema around users and security are likely to stay the same. Since the old code is already out there what’s stopping me from exploiting the software as it was? This looks an awful lot like marketing to me, and not like real security concerns.

whatiathisnontoday at 7:01 AM

This is completely stupid and ridiculous. Why not just use AI to patch your software? Its just as effortful as someone finding and exploiting a vuln on your system.

What's worse is your choosing to keep it buggy behind closed doors so no one can see the bugs. That's 100% the wrong approach.

com2kidyesterday at 9:24 PM

Proposition 1: The majority of a code in a modern app is from shared libraries

Proposition 2: The most popular shared libraries are going to be quickly torn apart by LLM security tools to find vulnerabilities

Proposition 3: After a brief period of mass vulnerability discovery, the overall quality of shared libraries will dramatically increased.

Conclusion: After the initial wave of vulnerabilities has passed, the main threat to open source code bases is in their own comparatively small amount of code.

andsoitisyesterday at 3:28 PM

> Today, we are making the very difficult decision to move to closed source, and there’s one simple reason: security.

It seems like an easy decision, not a difficult one.

amazingamazingyesterday at 11:37 PM

this is a big nothing. they relicensed the previous cal.com as cal.diy (MIT by the way, instead AGPL or something else) and effectively forked their own product into the "new" cal.com. anyone who cares would just use cal.diy as they were prior to this announcement with cal.com

show 1 reply
smetannikyesterday at 10:50 PM

This sounds more like a good excuse to go closed source. I feel that real reason might be revenue-related.

woodruffwyesterday at 3:47 PM

Today, it's easy to (publicly) evaluate the ability of LLMs to find bugs in open source codebases, because you don't need to ask permission. But this doesn't actually tell us the negative statement, which is that an LLM won't just as effectively find bugs in closed codebases, including through black-box testing, reverse engineering, etc.

If the null hypothesis is that LLMs are good at finding bugs, full stop, then it's unclear to me that going closed actually does much to stop your adversary (particularly as a service operator).

dangyesterday at 8:36 PM

Related ongoing threads:

Open Source Isn't Dead - https://news.ycombinator.com/item?id=47780712

Cybersecurity looks like proof of work now - https://news.ycombinator.com/item?id=47769089

notnullorvoidyesterday at 8:56 PM

Security through obscurity can be a good security layer, but you need to maintain obscurity. That's a lot harder than Cal.com seems to realize.

For example using something like Next.js means a very large chunk of important obscurity is thrown out the window. The same for any publicly available server/client isomorphic framework.

mellosoulsyesterday at 9:53 PM

The founder proclaimed "Open Source is Dead" in the original tweet.

I thought this was grandiose and projecting their own weakness onto others, an extremely unappealing marketing position that may get clicks in the short term but will undermine trust beyond that.

egorfineyesterday at 10:31 PM

What's preventing cal.com to run the AI researcher over their own codebase and find their vulnerabilities before anyone else and patch them all by tomorrow morning?

That's right. Nothing.

mastermagetoday at 7:49 AM

Security through obscurity has always worked out so well.

a-fadiltoday at 1:27 AM

Open source means living under constant scrutiny. AI just made that scrutiny cheaper and faster. I feel this every day maintaining an open source project. The temptation to close the source is real but let’s not forget that open source is what raised the bar for software quality in the first place.

show 2 replies
fedeb95today at 9:27 AM

security by obscurity doesn't work.

show 1 reply
codegeekyesterday at 8:19 PM

I am beyond convinced at this point that you either run an Open Source Project with a small revenue company (single digit millions) or run a software company that does more than 10M ARR at the least and be closed source. I know there are exceptions but most open source Software companies are providing code with heavy restrictions or teaser features and gate keep everything in their "ee/enterprise" version etc.

thegdskstoday at 3:58 AM

This is why CC0 and MIT matter for projects people depend on. Once you build on something with a restrictive license this is always a risk.

ernsheongtoday at 1:34 AM

Well let’s just finish and CLOSE them off. Delete all your subscriptions, boys.

alanceyesterday at 11:26 PM

I only found cal.com in the first place because I searched for an open source calendly alternative.

femtotoday at 1:06 AM

Will it make any difference to security? LLMs are excellent pattern matchers. The source is a sequence of tokens, the binary is a sequence of tokens. Whats the difference to an LLM?

axeldunkelyesterday at 9:34 PM

Sounds like "security by obscurity" to me - if you think AI is so good at finding security issues - it will find them in compiled code as well. Why not using it in your favor and let it search for bugs you'd otherwise not find?

show 1 reply
bearsyankeesyesterday at 3:50 PM

Think this is a bad, bad move...

https://news.ycombinator.com/item?id=47780712

evanjrowleyyesterday at 4:08 PM

Juxtapose this with the fact that many HNers will decry strong copyleft FOSS licenses as not being truly "open source" - the reality is that closed source software is still full of open-source non-copyleft dependencies. Unless you're rolling your own encryption and TCP stack, being closed source will not be the easy solution that many imagine it to be.

dhruv3006today at 3:22 AM

I guess this is an AI excuse again.

sreekanth850today at 3:49 AM

This has one of the most shittiest codebase out of all. Not surprised by this move.

lapinovskitoday at 7:36 AM

Cal.com was open source?

kartika36363today at 6:45 AM

thats like the funniest excuse to cash out on people's open source contributions

wqtzyesterday at 8:31 PM

In my advisory job founders always raise the question about open sourcing within the first hour of meeting me. They think that open sourcing product means transparency and developer trust which helps with early adoption. Every single founder I talked to brings up open source as a market penetration method to drive the initial adoption.

I always say to just stop with the virtue signaling led sales technique.

I despise the "we are like the market leader of our niche but open source" angle. Developer as a buyer and as a community these days in my opinion do not care about open source anymore. There is no long term value to that. The moment a product gets traction the open source elements is a constant mild headache as open source product means that they have no intellectual copyright on the core aspect of the product and it is hard to raise money or sell the company. And whenever a product gets traction they will take any excuse to make it close source again. With an open source product they are just coasting on brand. Regardless of what your personal opinion is, this has been largely true for most for-profit business.

Open source is largely is nothing more then a branding concept for a company who is backed by investors.

huslagetoday at 3:22 AM

Cal.com is failing. This is a rugpull with an AI excuse.

adamtaylor_13yesterday at 4:00 PM

Could you not simply point AI at your open source codebase and use it to red-team your own codebase?

This post's argument seems circular to me.

asdevyesterday at 3:56 PM

Who even uses their open source product?

constantlmyesterday at 10:41 PM

Security through obscurity isn't a great strategy.

🔗 View 29 more comments