:
[SECURITY]

CAL.COM CLOSES OPEN-SOURCE CODE OVER AI SECURITY RISKS

AI DESKWED, APR 15, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

Cal.com, a scheduling software provider, is moving its core codebase from open source to a closed repository. The company cited vulnerabilities to AI-powered attacks as the primary reason for the shift.

Cal.com's decision marks a significant departure from open-source principles, driven by concerns that publicly available code can be exploited by AI tools. The company stated the move addresses modern security threats rather than traditional vulnerabilities. The scheduling platform joins a growing list of companies reconsidering open-source strategies in response to AI capabilities. By closing its core repository, Cal.com aims to reduce exposure to automated code analysis and potential exploitation by machine learning-based attackers. While the company remains committed to supporting its existing open-source community, the core infrastructure will no longer be publicly accessible. This decision reflects broader industry tensions between transparency and security in the age of advanced AI tools. The move underscores emerging concerns about how AI systems can identify and weaponize vulnerabilities in publicly shared code at scale—a challenge traditional open-source security models may not adequately address.

■ SOURCES

Techmeme

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Threat actors use underground guides to vet carding shops based on data quality, reputation, and longevity. Security firm Flare has detailed how trust operates within cybercrime markets.

JUST NOWIndustry Desk

Kamerin Stokes, 23, of Memphis, Tennessee, received a 30-month prison sentence for selling access to tens of thousands of hacked DraftKings accounts.

2H AGOSecurity Desk

Cybersecurity experts have identified significant privacy and security vulnerabilities in the EU's age verification application, contradicting earlier claims that it was ready for deployment. EU officials have since downgraded the status to a "demo."

2H AGOSecurity Desk

Bluesky has endured a distributed denial-of-service (DDoS) attack lasting nearly 24 hours, disrupting service for users of the decentralized social network.

3H AGOIndustry Desk