No amount of source-level verification or scrutiny will protect you from using untrusted code. – Ken Thompson