I don't think these are able to be stolen in any meaningful sense, based on how they describe their tech stack.
I don't think these are able to be stolen in any meaningful sense, based on how they describe their tech stack.