• No amount of source-level verification or scrutiny will protect you from using untrusted code.

    Ken Thompson: No amount of source-level verification or scrutiny will protect you from using untrusted code.
    "Reflections on Trusting Trust". Communications of the ACM 27 (8), (pp. 761-763), August 1984.