If you're worried about backdoors, reverse engineer it and verify that it works as advertised. Given that the program has to largely duplicate an existing set of source, this should be trivial.