When a system documents its own limitations as part of its normal operation, outside observers cannot distinguish "limitation addressed" from "limitation documented." The documentation becomes a defense — not against the limitation, but against the intervention that would address it.