Limits and constraints are set by the program that reads the config, so no, not whatever. The only way that is a thing, if the program stated that the configs can do whatever, which at that point, is a script.
Also if a config can do what ever, then most likely that’s a security vulnerability.
Configs can do whatever too.
a config file can do only what the program that reads it allows. if the program that reads the file is just bash…
Limits and constraints are set by the program that reads the config, so no, not whatever. The only way that is a thing, if the program stated that the configs can do whatever, which at that point, is a script.
Also if a config can do what ever, then most likely that’s a security vulnerability.