The feature of C, Perl, Unix and other hackish totems that so endear them to hackers. Being able to have a file named -rf in your directory, and then maybe being surprised by what rm * does, is a fine example.

Feel free to add more examples, both real and invented.