• @vinyl
    link
    12 days ago

    Limits and constraints are set by the program that reads the config, so no, not whatever. The only way that is a thing, if the program stated that the configs can do whatever, which at that point, is a script.

    Also if a config can do what ever, then most likely that’s a security vulnerability.