You have apps using Metal, which is quite normal.
Multiple apps using Metal is also quite common.
Build GPU binaries with Metal - WWDC20 - Videos - Apple Developer
Postings from folks featuring “am I hacked?”, and usually including benign logs, benign telemetry, or some utterly benign screenshots or such are also common, too. I’ve yet to encounter one of these “am I hacked?” postings here that had anything malicious, though there have been a few with buggy apps.
Based on available information, exploits are targeted, or the user has gone and overridden security and loaded the exploits. We don’t know your value as a target. We don’t know what you’ve been loading. There are folks here that are investigative journalists, political dissidents, with access to sensitive or classified data, that have somehow annoyed some very rich folks, or with access to great wealth. Most of us aren’t targets. Are you? We don’t know. (And if you are, you probably don’t want us to know that.)
Nor do we know what “security” or “cleaning” apps have been installed, nor what problems those added apps might be or are sometimes causing.
More generally, we cannot prove a negative. No one can prove you’re not hacked.
What happens here next? Usually nothing. Digital forensics require direct access, and ~nobody is going to perform forensics for free. Not without some good evidence of exploits. Which means those concerned about having been exploited get to learn how to secure their environments, about partitioning their digital data, how to collect evidence, or pay for forensics, or learn about and perform their own forensics. Jonathan Levin's New OS X internals book (three volumes) is a good starting resource for learning about the innards of macOS.
As for that Metal shader chatter, eh, at worst it’s likely a buggy app, or a tangled-up Safari tab. But can anybody prove that? Nope.