There were a number of highly sophisticated elements to this attack, such that it clearly came from a nation-state level actor. Seems like they tried to make it look like China but probably actually Eastern Europe.
Anyway the guy uploaded a bunch of test files to verify compression, and they decrypted into the payload, which was cute, and disabling error checking as you noted. But the really clever bit is it checks how it's being built and omits the backdoor when compiled standalone, it's only included when compiled into a rpm or dpkg. Who's going to do that, trying to find bugs?
Moral to the story, which I assure you all the intelligence agencies are taking in hand? Debug your exploits, software quality matters, and if the public finds bugs fix them quickly.
As for avoiding recurrence, that's a much tougher problem. Many contributors want to remain effectively anonymous and use handles and single use email. You can't check every line of code. Maybe some sort of system of attribution, a web of trust sort of thing. Growing pains that I suspect will look hilariously naive looking back on this in ten years.