No amount of source-level verification or scrutiny will protect you from using untrusted code.
Ken ThompsonThe average gardener probably knows little about what is going on in his or her garden.
Ken ThompsonI wanted to separate data from programs, because data and instructions are very different.
Ken Thompson