Gr4 I wasn't asking about best practices on GOS in general
That's not what I gave you. I gave you very specific and practical instructions.
Gr4 I must go trough these steps:
Unbox the phone (on August 2023 patch level out of the box IIRC)
Stock OS and firmware updated to the latest version
Flash Graphene OS
How to go from step 1 to step 2 safely or without being so badly compromised to the point that step 3 is affected ?
I'm not sure what you're looking for, magic? You only have two options to update the device, either using the OTA updater within the stock OS with connectivity (cellular/Wi-Fi) enabled, or using the recovery mode to sideload Google's latest OTA update file from a computer as I suggested. There's another good option I haven't thought about, which is installing GrapheneOS with the WebUSB-based installer from another, up-to-date Android phone, which would also update the firmware to the latest version as a byproduct.
Theoretically, vulnerabilities could lead to compromise of (for example) the secure element. Theoretically, it might also be possible to persistently compromise them. There is no known way to bypass verified boot currently: if you hold the power button for about 30 seconds, it should forcibly (using a hardware mechanism) reboot the device, which should also power cycle the secure element (which has its own internal verified boot process). Still, you can reduce the doubt in your device by updating it safely, as quickly as possible. Your only options to do it are listed above.
After installing GrapheneOS, you can use the power button trick and then immediately boot into Fastboot mode, from there enter recovery mode, stop on the verified boot key fingerprint screen, compare it to what you can see on GrapheneOS's website, resume the boot into recovery mode, open the recovery mode menu, and check that the GrapheneOS version written at the top is up-to-date. (You don't need a security preview release to have the up-to-date firmware. The security previews have fixes for Android OS vulnerabilities. The latest Pixel firmware is part of the security patch level which is up-to-date in the non-preview releases.) This should give you a baseline assurance that you installed the authentic GrapheneOS on the device with the up-to-date Pixel firmware that they always bundle in it. I also recommend setting up the Auditor app and checking its result, but not instead of this.
Gr4 The phone still connects to cell towers without a SIM, both talking and listening
I doubt that it happens in Fastboot and recovery modes.
Gr4 does this allow an adversary to give me the real GOS verified boot hash while i installed a compromised version ?
The only way I can see something like this occurring is either an attacker finds a way to exploit the component that checks the next component as/before it completes the check, or the check is completed but the OS is compromised post-boot somehow. The latter makes verified boot meaningless for that version of GrapheneOS in that boot mode (with the option to restore the verified boot assurance — if you install an updated version of GrapheneOS that fixes the vulnerability exploited to achieve this). The former would be extremely difficult, is believed to be impossible to achieve currently, and there's the aforementioned power button trick that lets you 100% ensure that the verified boot checks are restarted properly.
Gr4 Yes, but I need to unlock the bootloader and connect it to my compromised PC in order to flash GOS. If the Stock OS gets compromised when i try to update it, how can i trust that it correctly upgraded the firmware and/or OS before trying to flash GOS ?
If you don't suspect it can persistently bypass verified boot on the device, you can do what I suggested above to do after installing GrapheneOS, because GrapheneOS always bundles the latest Pixel firmware in it, and has extended checks to check that the latest firmware is installed, as they claim on the features page. (“Enable bootloader, radio, and boot partition version / fingerprint checks.”)
If you refuse to use another Android device because that's “bad opsec” (whatever that means), your computer is compromised, and you don't want to use wireless connectivity in the booted OS to update, then there's nothing you can do.
Gr4 is there such a known AVB vulnerabiliy
Verified boot is a process/method, not a specific program/executable/code. You should define what you mean by a “verified boot vulnerability” as that's a vague term. Also consider that verified boot is also a psychological feature because it gives you the assurance of the validity and authenticity of the operating system and firmware on your device. The question is, when can this assurance be broken, how, and is it possible to reassure it or is it persistently broken. See above.