Deployer keys should be completely untrusted and treated as throwaways. Even for an upgradable protocol, a key should deploy, configure, then permanently give up control. Then main governance can then verify and accept the new code.
1,38K