p-m we don't support either Developer Options being enabled nor the use of adb/usb debugging.
ADB exposes an enormous amount of attack surface.
If you have ADB access, you can enable perf events, but there's a lot more attack surface via ADB than that and it's as close as it gets to having root access without an exploit.
ADB has near full control of the device, but isn't meant to actually have root access on a production build. It can be used to do everything you can do via the UI but also far more which expose a lot of attack surface.
ADB isn't advisable on a production device either way.
Same reason we don't support root:
App-accessible root controlled by the user interface / application layer would turn a huge amount of the OS into immensely trusted attack surface.
If any of the options in developer options were aligned with our ethos and focus and benefitted the user in a private/secure way and if they were stable we would expose them in the standard settings menu. There is a reason we don't.
We could only start to look into this as an actual GrapheneOS issue when any changes etc done through USB Debugging were reverted via a Factory Reset.