Limits and constraints are set by the program that reads the config, so no, not whatever. The only way that is a thing, if the program stated that the configs can do whatever, which at that point, is a script.
Also if a config can do what ever, then most likely that's a security vulnerability.
From experience when I look for something "easier to digest" I end up spending more time tinkering and fucking about than just reading the man pages because the latter usually had a lot more context about the software and any other weird quirks.
🤨