

It’s a function of a “pod” within podman.
I wrote the podman examples for AudioMuseAI using a pod: https://github.com/NeptuneHub/AudioMuse-AI/tree/main/deployment/podman-quadlets
And I have an example *arr suite on my GitHub page: https://github.com/K3CAN/podman-arr-quadlets


Seems to be specific to rewrites using an un-named capture.
grep -rnE "\$[0-9.*].*\?" /etc/ngnixshould show if you have any potentially vulnerable directives in your config.