Trust not only they are not malicious, but also they won't have some kind of vulnerability.
Plus if it's encrypted how is the other party going to read the file? The key will have to take the same path.
Wouldn't that still be the case if relay servers didn't exist? A hacked version can send your file to the wrong person.
The vulnerability doesn't even have to be in their software, but in any piece of software they use, ssh, nginx, etc.
A meaningful vulnerability would have to be in either the software itself or in the coordination server. That attack surface is the same whether or not you have relays.
You can reduce the attack surface to just the software if there's a way for users to verify keys manually. But again, same attack surface whether or not you have relays.