Limits and constraints are set by the program that reads the config, so no, not whatever. The only way that is a thing, if the program stated that the configs can do whatever, which at that point, is a script.
Also if a config can do what ever, then most likely that’s a security vulnerability.
Configs can do whatever too.
Limits and constraints are set by the program that reads the config, so no, not whatever. The only way that is a thing, if the program stated that the configs can do whatever, which at that point, is a script.
Also if a config can do what ever, then most likely that’s a security vulnerability.
a config file can do only what the program that reads it allows. if the program that reads the file is just bash…