I meant vulnerabilities that are intentionally inserted into the code. Unfortunately, many people make mistakes even in serious projects and the links that you provided prove it. In this case, no one is immune.
Creating an exact copy is not a sensible solution. TOR is not a panacea, and its clone will not be the same, as it is also unclear who will control the output nodes. I can give many examples from the white book, but I do not see the point of doing this and prove the incompetence of those people who wrote these fairy tales for children. In my opinion, this project is a fraud.