For a given size of $p$, random $p$ are believed safer than $p$ chosen by an adversary, at least w.r.t. the state of the art in computing Discrete Logarithms (which is enough to break DDH).
This is because for $p$ of the form $r^k\pm s$ for suitably small $r$ and $s$, a special algorithm is available for the Discrete Logarithm Problem (broadly, a DLP-oriented variant of SNFS) that is considerably faster than the best one known for most other $p$ (broadly, a DLP-oriented variant of GNFS).
As far as I understand, this 1024-bit DLP record by SNFS could have been carried with comparable ease with the 1024-bit safe primes $p=2^{1023}+1671615$ or $p=2^{1024}-1093337$, when the later record for arbitrary safe prime is 795-bit, with more effort.
Answers to this closely related question might help.
If one wants to delegate the search of a safe prime (although it's not very hard), an option would be to ask that all except say it's low-order 64 bits are output of some PRF (e.g. SHAKE-128) for a stated (or specified) input.
A similar method is used in the standard Oakley (aka MODP) groups of RFC 2409 and RFC 3526. These are intended to block SNFS, but still allow welcome simplifications and a modest speed improvement in normal use of the group.
Don't miss the important point made in that other answer that fresh $p$ are safer.