If you haven't disabled the check added in the linked PR, you are secure. Any insecure servlet will fail to start up, with: "ERROR: Service deserializes enhanced JPA/JDO classes, which is unsafe". An exception will be thrown, and you either must circumvent the check by disabling it, or must change the service/bean to prevent the condition from happening.
If you have disabled that check, you will see a warning in your server logs after the first time the service is called: "WARNING: Service deserializes enhanced JPA/JDO classes, which is unsafe...". This is unsafe.
Regardless of whether or not you disable the check, if a serializable bean/DTO/POJO has JPA/JDO annotations on it, there will be a GWT compiler warning. If that type is never actually readable from an RPC RemoteService that is used, neither of the above error/warning will occur, and your application is safe.
If you did disable that check, you need some way to either guarantee that the user cannot or will not send dangerous payloads, issues 9880 and 9881 outline approaches we could consider as a toolkit to resolve this. Beyond the contents of the linked issues, there isn't much I can suggest in the space of an email without much more information about your codebase and use cases.