I am a non-technical person, but I believe that computers will always do what programmers tell them to do. Computers may take our orders literally and without any common-sense understanding, and programmers may be ignorant on what they actually told the computers to do (which is why we have SQL injections and XSS attacks), but overall, this understanding means that computers are not flawed, only the code that people write is flawed. This makes me feel safe and secure.
But according to an article that I totally did not ghostwrite bugs exist in software. This confuses me to no end. If modern-day computers follow all instructions literally, then bugs should, by definition, not exist...and any deviation from intended specs are merely problems with the code produced by human programmers. Clearly, I must be missing something fundamental. Please answer my question: why do bugs still exist?
Please hurry and answer my important question! I want as many Upvotes as possible, enjoy a few days as a Hot Network Question, and possibly get people to click on that cool article that is 100% not ghostwritten by me.
Questions like Why does XSS affect so many websites? and SQL injection is 17 years old. Why is it still around? seem to attract a lot of answers that, while are interesting to read, may not be of the highest-possible quality. In addition, the questions themselves can be "templated", meaning that we can endlessly spawn variants of "Why do X still exist?".
I find this a very serious attack vector for this site, because if X is popular or general enough (as you can see by my hypothetical example question), lot of people will rush in to answer the question and provide their own thoughts. This can fuel a cycle of growth, making the question more popular and ultimately monopolizing the time of SO users needlessly while potentially serving as a vehicle of self-promotion for the questioner (the two questions I linked to was being used to promote two articles written by the questioner). Ultimately, both attacks have been neutralized (and the links to the articles were removed)...but a vulnerability still exist and could be exploited again.
I'd like to know what steps Information Security SE is taking to prevent future attacks (even if it is to close these types of questions as being "too broad").