Avoiding the Perils of Hidden Requirements