SgtSurehand I have always relied on the boot hash to tell me my installation is genuine. Is it possible that the hash on the "device is loading a different operating system" is correct yet OS is compromised?
There shouldn't be. The hash is the hash of the verified boot key, so it will only be able to load validly signed data. But verifying the signature over the zip-file is still good to do. The installation zip file contains many separate firmware components that are separately signed for verified boot, so you could possibly end up flashing a validly signed GrapheneOS that is the latest version as shown when booted, yet, some firmware components are valid and legitimate but really old versions with known vulnerabilities. The signature over the zip file would catch that, but depending on how the verified boot is implemented, it is not guaranteed that one will catch it. And it is possible of course that not all data blocks are there, and what you flash is incomplete. Everything that is loaded is valid, but it may fail to load some things.
So, the boot hash should be enough to verify to be sure there are no malicious code, but it might not guarantee that the system was flashed fully and as the intended unit. Someone who know exactly how the verified boot is implemented may answer more accurately.
The OS will be a unit though, since it uses dm-verity over the whole image. An attacker cannot manipulate that to mix and match between versions.