It is important to verify that it was a CI that uploaded the artifacts.
Assume I am a Github repo owner, but I don't own the CI server - I use a public one.
A user can then read CI logs to see the checksums, download the archive and check them. This prevents the Github owner from deleting the CI release and putting a malicious binary manually, providing a correct new hash sum.