The
feature of
C,
Perl,
Unix and other
hackish totems that so endear them to
hackers. Being able to have a file named
-rf in your directory, and then
maybe being surprised by what
rm * does, is a fine example.
Feel free to add more examples, both real and invented.