Re: 10 Immutable Laws of Security
May I add:
"If you feed data into an overly powerful ad-hoc interpreter, it's not your interpreter processing the data, it's the data controlling your interpreter. "
Always consider this when slurping stuff from untrustworthy sources.