One does not place backdoors in hash algorithms. It's much more interesting to place backdoors in key agreement protocols.
How would NSA have "placed" a backdoor in Kyber? NSA didn't write Kyber.
How would NSA have "placed" a backdoor in Kyber? NSA didn't write Kyber.