you don't need to call eval for the usual config file setup, only read.
(but you often get something much better when config files are plain lisp code; i.e. they are eval'ed, assuming that the threat model allows it)