...
A more permanent solution will require reviewing your existing scripts, identifying what changes can be made to work within the defined security constrainsconstraints, and as needed, creating custom commands to wrap execution of prohibited functionality.
Note that this configuration setting does not affect the new Custom Files Processor scripts, which will always execute with all security constraints in place regardless of this configuration setting value.
Other Security Options
It is beyond the scope of this article to describe configuration options to minimize the attack surface area of Data Import, but some options to consider include:
...