Suppose you're a "bad actor", knowing this is a shared service, wouldn't you look for 0 days in it ? A carefully crafted exploit has the potential to leak specific content from unaware customers again.
The attack surface is nginx (http://nginx.org/en/security_advisories.html) plus each component of each loaded module ...
It would be saner to apply isolation to each element of the cartesian product between customers and services.
The performance (and cost) impact can be mitigated by scheduling resources over a pool of disposable virtual machines (obviously in xen and with iommu protection), but I bet they can develop even better solutions.