Open Source SaaS is Dead; Long Live Open Source
The Open Source Security Debate
Last week, the CEO of Cal.com announced that the company was going closed source. As he put it, "continuing as open source would put our application, our customers, and the sensitive data we handle at significant risk" due to "AI-driven security threats."
Cal.com is arguing for security through obscurity. But long-term, obfuscation is a losing strategy against a tireless attacker.
Going from open to closed source doesn't mean that the previous information disappears. You can shuffle things around in the dark, and this decision might buy them a little extra time to shore up known vulnerabilities, but they're not going to rearchitect entirely. And what if the proprietary source code is later leaked (say, as has already been the case for both Okta and Auth0's codebases)? Now attackers can feed that hidden map, albeit perhaps a bit outdated, into their tooling, but the rest of the community doesn't get to see how things are (or aren't) secured.
Should we protect our methods of encryption by moving them to closed source? our databases? Should Linux go closed source?
The real difference here is not that calendar booking is any less critical to secure, or even whether the source code is publicly available; the issue is vendor-hosted SaaS. Cal.com's primary business is to sell SaaS subscriptions. That means the company is tasked with directly protecting all of its customers' sensitive data, using its own infrastructure. This is a single, massive target that's worth attacking. If someone can spend enough tokens to find a vulnerability in this publicly accessible infrastructure, this potentially means immediate access to all data accessible by the Cal.com team across tens of thousands of accounts.
We work with multiple federal agencies, Fortune 500's, and other leading providers who handle extremely sensitive data. In terms of high-value targets, authentik is also securing plenty of critical infrastructure and sensitive data. However... while it's the same underlying code everywhere, it's not the same shared, publicly available SaaS. Many of these authentik instances are entirely airgapped. They are all scoped down to "expected" use, whether through specific authentication and user access policies, locking down endpoints that don't need to be publicly accessible, or a customer's own firewall. While finding a critical vulnerability in authentik wouldn't be good, it would also be much less likely to result in an immediate breach of data across all our customers compared to a shared SaaS model.




