Any security engineer / technical security auditor worth his salt will a) point that out to you in a meeting b) prove it to you through pentesting if needed.
SCADA systems in general are on the more
As so many digital-age inventions, this has been done in Finland ages ago.
Real Programs don't use shared text. Otherwise, how can they use functions for scratch space after they are finished calling them?