Theoretical but pragmatically unlikely. The reduced security mode required for that Linux hack puts up a disclaimer from Apple that this mode is totally unsupported for production workloads. ( It is probably mainly a bootstrap backdoor for macOS/Mach kernel developers to bootstrap a new version of kernel devleopment. All of that is "pre-production" workloads).
I fully agree that VMWare is unlikely to port ESXi to run native.
However, on a tangent, having read some of the twitter discussion by current and former Apple employees who worked on it, that reduced security mode really is intended to support use cases like running alternate operating systems. They put a lot of thought into how to design a secure-able back door:
Basically, when you do this, you're attesting to recoveryOS that you, the physically-present password-verified administrator of that Mac, believe a specific file is safe for Apple's Secure Boot to load and run. It's not explicitly spelled out in that particular twitter thread, but when you do this, recoveryOS stores a cryptographic hash of the file in the Secure Enclave. In the future, each time you boot that file, Apple's Secure Boot code cryptographically verifies it hasn't changed since you attested to its safety.
That makes it possible to securely boot a third party OS like Linux without Apple having to sign everything in the chain. So long as you're really sure you're not making a mistake when you attest to the safety of the Linux bootloader, and the rest of the Linux-provided bootloader chain has secure signing checks, you can have a chain of trust all the way from the M1's immutable (stored in mask ROM) stage 0 bootloader to the Linux kernel. Pretty slick, IMO.
The reason Apple puts up those warnings is that you're telling the computer you want to bridge from Apple's chain of trust to somebody else's, and there is no way for Apple's code to tell that the user isn't just being social-engineered into installing a copy of MalwareOS. They've made it scary and obscure enough that even naive users are likely to stop.
(another notable thing: With this scheme, provided you have FileVault enabled, there's zero degradation of security for your macOS installation(s) just because you wanted to set up a Linux partition. That's a big step up from T2 Macs, where you had to completely disable Secure Boot to run any OS not signed by Apple.)