@Micah_Edelblut It seems that you are affiliated with Bitwarden, and if so, I would suggest that you have the Bitwarden logo added to end of your forum name and to your avatar (maybe @sj-bitwarden or @bw-admin can help with this).
Although your concerns about getting locked out of an account are understandable, there are a lot of use-cases in which a passkey is not the only way to access an account. For example, some accounts may allow you to continue using your username/password for authentication, while the passkey is an alternative authentication option. Probably a more common use-case (at least for myself) is to use syncable passkeys stored in Bitwarden as an alternative/complement to hardware security keys (whether for 2FA or for passwordless login). For example, in my case, when I use hardware keys for 2FA, I usually have multiple keys registered, and I often add a Bitwarden-stored passkey to those. There is no risk of losing access to the account if I lose my Bitwarden-stored key (because I have backup keys registered, as well as 2FA recovery/reset codes).
I’m not sure how to make the case that deleting these non-essential passkeys is “important”, but I think it is important to empower users to change their mind about using Bitwarden-stored passkeys, and therefore be able to delete passkeys that they no longer wish to use. Another use-case would organizing vault contents by consolidating redundant items etc.
Currently, the only way to delete a passkey is to clone the existing vault item, and then delete the original vault item. However, this is not always an acceptable work-around, because cloning an item strips not only the passkeys, but also the file attachments, the password history, and all metadata (creation/modification timestamps, etc.).
For this reason, if I wish to add a passkey as a 2FA method for one of my existing accounts, I currently have to create a second vault item just to hold the passkey (so that I don’t have to delete the existing vault item in case I want to delete the passkey in the future). This creates unnecessary clutter in the vault, and makes it more difficult to keep your credentials organized and up-to-date.
Would you mind briefly explaining the technicalities behind this constraint? I’ve heard from a user who tried it that passkeys are included in JSON exports and can be imported back into Bitwarden; to me, this does not seem much different from the actions that would be need to delete/undelete a passkey. Regardless, having more information about the technical constraints would help us suggest possible solutions.