Reverse dynamic port forwarding as showcased here https://github.com/RedTeamOperations/PivotSuite#case-2--reverse-tcp-tunneling ignore --local-ip and --local-port so the server (attacker machine) always take a random port and take the address 0.0.0.0 and so exposing publicly the proxy on all interfaces.
One should be allowed to set --local-ip and --local-port on client side and the server should use them.