Life in the yellow box
Contracting for a formerly large company that once dominated the "image" field, I discovered that in implementing their configuration management system, the project had relied on every machine having writable copies of all scripts. I thought I knew better than to raise this formally, but I figured letting it slip in conversation would have the desired effect. Well, the scripts did get replaced by links to secure copies. But I still got accused of being a hacker. This after I'd cut their build cycle from six weeks to two hours.