Keyboard Navigation
W
A
S
D
or arrow keys · M for map · Q to exit
← Back to exhibits
Data IntegrityDesign FlawEXP-025

LEO I — The First Business Computer Bug

When automation amplified errors as effectively as efficiency

1940s–50s · Machine Code · 3 min read
Pattern Classification
Class
Transitive Trust
Sub-pattern
Supply Chain Inheritance
Invariant

When a system inherits trust from a source it did not verify, the attack surface extends to everything that source touches.

This Instance

Third-party code is trusted implicitly because the distribution channel is trusted

Detection Heuristic

If a system grants access, installs code, or executes actions based on the identity of a source rather than the verified content of what that source provides — trust is transitive, and the weakest link in the chain becomes the actual security boundary.

Same Pattern Class
Why It Persists

Every layer of abstraction introduces a new trust boundary. Package managers, CI/CD pipelines, container registries, AI agents — each inherits authority from the layer above without independently verifying it.

This section is being excavated...

Archaeologist's Note

This pattern has been found in applications built by talented developers at respected organizations across every decade of software history. Its presence in a codebase is not a reflection of the developer who wrote it — it is a reflection of what that developer was taught, what tools they had, and the path that was easiest given what they were taught. The goal is not to find fault. The goal is to find the pattern — before it finds you.

Katie's Law: The developers were not wrong. The shortcut was not wrong. The context changed and the shortcut didn't.

The FoundationThe Dawn Room3 / 11
Previous ExhibitMuseum MapNext Exhibit