No amount of source-level verification or scrutiny will protect you from using untrusted code.
Just think, IBM and DEC in the same room, and we did it.
We have persistent objects, they're called files.
One is that the perfect garden can be created overnight, which it can't.
So maybe I can go back to being a Gardeners' World addict again.
In college, before video games, we would amuse ourselves by posing programming exercises.