@phildini In the abstract, assuming no need for deniability, having it is better than not having it, but as with most things it comes down to your threat model. If you don't trust your Git repository host to not tamper with things, then it's useful. If you only sign with touch-activated Yubikeys and validate it before deploys, it could be useful. If you sign with the same SSH keys you auth to GitHub with, and you trust GitHub and have your accounts there locked down, it doesn't get you much.
@aschmitz @phildini (for example, one could simply add a commit to a working branch rather than try adding it to the main branch, and the next time the working branch is rebased, it gets a signature from the unawares contributor. at this point, the signature means nothing)