One is that the perfect garden can be created overnight, which it can't.
In fact, we started off with two or three different shells and the shell had life of its own.
One of my most productive days was throwing away 1,000 lines of code.
There's a lot of power in executing data - generating data and executing data.
No amount of source-level verification or scrutiny will protect you from using untrusted code.
It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution.