Skip to main content
Startups 2 min read

Cal.com Abandons Open Source, Blames AI-Powered Security Threats

Cal.com closes its open-source codebase after 5 years, citing AI-driven vulnerability scanning. The community is split.

Cal.com closes its open-source scheduling platform
Cal.com closes its open-source scheduling platform
  • Cal.com moves its core scheduling codebase from public to private after five years of open-source development.
  • The company cites AI-powered vulnerability scanning as the primary security threat forcing the transition.
  • A new MIT-licensed project called Cal.diy replaces the public repo for hobbyists and self-hosters.
  • The announcement follows reports that AI uncovered a 27-year-old BSD kernel vulnerability and generated working exploits in hours.

Cal.com Closes the Code That Built Its Community

Cal.com, the open-source scheduling platform used by thousands of developers and enterprises, is going closed source. Co-founder Bailey Pumfleet announced the decision on April 14, calling it “a response to what risks AI is making possible.”

The core argument: AI tools can now scan open codebases systematically, map attack surfaces, and generate exploits at near-zero cost. “Being open source is increasingly like giving attackers the blueprints to the vault,” the company wrote in its official blog post. Huzaifa Ahmad, CEO of Hex Security, contributed to the announcement, claiming open-source applications are “5 to 10 times easier to exploit” than closed ones.

The timing is not coincidental. Days before the announcement, reports surfaced that an AI system had uncovered a 27-year-old vulnerability in the BSD kernel — one of the most audited open-source projects in existence — and produced working exploits within hours. Peer Richelsen, Cal.com co-founder and chairman, told The New Stack: “We made this decision long before Claude Mythos and the OpenBSD vulnerability was announced, but the timing is frightening.”

The Community Is Not Buying It

The reaction on Hacker News and X has been sharp. Critics argue the AI security framing is a convenient cover for a business model shift. Closed-source code is not inherently more secure — it just hides the vulnerabilities from everyone, including the people who would fix them for free. Many in the open-source community point out that “security through obscurity” has been debunked for decades.

Cal.com is not abandoning the community entirely. The company released Cal.diy, an MIT-licensed fork for self-hosting and experimentation. But the production codebase — including major rewrites of authentication and data handling — stays behind closed doors. “Cal.com handles sensitive booking data for our users. We won’t risk that for our love of open source,” the company stated.

Whether this is a genuine security response or a strategic licensing play, Cal.com’s move signals a broader tension in the industry. If AI can weaponize transparency, the open-source model that built modern software faces an existential question — and Cal.com will not be the last company forced to answer it.

Cal.com | Bailey Pumfleet on X | Peer Richelsen on X