If you disable a qvm-service (example: qubes-updates-proxy) for sys-whonix VM
the file
/var/run/qubes-service/qubes-updates-proxy
is created nonetheless (not expected) and as a result of that, the systemd service qubes-updates-proxy.service is enabled (because above file exists).
This means that the Qubes methodology to enable/disable service appears broken for whonix-gw-14 based AppVMs.
dom0: "qvm-service sys-whonix" output:
qubes-updates-proxy off