This made me download Qubes. Amazing project that seems to care.
If a laptop does have an internal microphone, I just assume it is on and recording.
Other than that, I don't assume any other part of the laptop is compromised, but maybe I should. Thanks for asking this thought-provoking question.
My thinking on the subject was roughly that for an attacker to have the ability to spy on me via that mechanism would strongly imply that they already have privileged access to my computer (to be able to active the device and exfiltrate the data).
At that point, personally, I'm far more worried about the data they'd get from my keyboard (specifically credentials for various systems) than I am about them being able to see me sit at a desk.
Another type of user keeps confidential stuff out of networked computers and the cloud entirely.
Both are worthy defense strategies.