@jonafato relatedly from the trusted publishing docs https://docs.pypi.org/trusted-publishers/security-model/
GitHub Actions' own security model for OpenID Connect tokens is a little subtle:
and furthermore (emphasis not mine):
PyPI has protections in place to make some attacks against OIDC more difficult (like account resurrection attacks). However, like all forms of authentication, the end user is fundamentally responsible for applying it correctly.
when pgp keys were removed from pypi, a lengthy justification was provided by the same engineer who developed the trusted publishing workflow regarding the difficulty in using them correctly (which was itself flawed but that's a separate topic).
there are in these cases (as you note) no specific protections ensured, while alternatives are removed. it's a really upsetting tradeoff to provide to the community and it's a pattern of behavior that has advanced in recent years.
@sdwilsh To quote the hit 1993 film Super Mario Bros.:
Nothing's impossible, Mario. Improbable, Unlikely, but never impossible.
2022: "We are building a new way to publish and consume actions that will improve the security of the CI/CD supply chain."
2025: closed as not planned