Limits and constraints are set by the program that reads the config, so no, not whatever. The only way that is a thing, if the program stated that the configs can do whatever, which at that point, is a script.
Also if a config can do what ever, then most likely that's a security vulnerability.