This has been discussed multiple times also, so I'll leave some articles.
https://privsec.dev/posts/android/f-droid-security-issues/ <- as you mentioned from privsec.dev
https://github.com/obfusk/fdroid-fakesigner-poc?tab=readme-ov-file#update-2024-12-30-2 <- Obfusk is an ex F-Droid developer.
https://news.ycombinator.com/item?id=42764108 <- Some discussion on HN back in 2022.
https://discuss.grapheneos.org/d/18731-f-droid-vulnerability-allows-bypassing-certificate-pinning <- One of the posts on this very forum.
In terms of trust, your always trusting someone else, unless you can verify every line of code, know how the app is designed, and build from source, its about who to trust.
F-Droid build the apps and distributes them, with their own keys, if their signing server is compromised, they can push malicious updates, the fix here is to use individual signing keys for the app, which is why Github is a good alternative, as its the dev with the key, not the platform.
But in the past their attitude towards security wasn't great either.
Aurora has similar issues.
https://discuss.grapheneos.org/d/13828-automatic-aurora-store-update-start-of-aurora-store
https://discuss.grapheneos.org/d/21269-problems-with-aurora-and-neo-stores-not-sure-what-they-are-insight-needed/10#:~:text=GrapheneOS%20has%20never,way%20of%20usage. and another
Now, in some of the discussions (especially on Reddit), they mention GrapheneOS is on the extreme end of security, and while yes they are, it doesn't mean they are wrong, and its good to point out these issues.
So, research and decide based on your threat model, if it allows you to use Google somewhat, get your apps from the Play store where possible, if not pick your sources for app installs.