https://gist.github.com/aexaey/3646bb438f8712cbadf5/revision...
Scroll to the third change from the top - stupid github doesn't allow (an obvious) way to make a direct link to a particular gist's revision.
If the key-generator embeds a secret key (for seed exfiltration), the backdoor design will never be robust against reverse engineering. In fact, exposure of the embedded key gives to the attacker the ability to retroactively factor with ease the moduli of public-keys generated in the past, and recover the private-keys.
The designs of Curve25519 and illusoryTLS embed only an elliptic-curve public-key. Therefore, the exploitation requires access to the associated private-key /i.e., NOBUS property).
For the longer story about the sorrow state of the Web PKI and the nitty gritty details on this cryptographic backdoor, you may want to review the illusoryTLS whitepaper http://conference.hitb.org/hitbsecconf2015ams/wp-content/upl...