Can you control permissions when using the old application API key?
Does the new OAuth2 authentication system use the permissions of the authenticated user (i.e. who accepted the OAuth2 flow)?
Knowing whether the API key allows the behaviour is important even if the new OAuth2 system provides this level of control.