Indeed - ensuring prompt revocation workflow for security keys has always been best practice. Also, according to the Ars Technica article, the bar is higher:
"The attacks require about $11,000 worth of equipment and a sophisticated understanding of electrical and cryptographic engineering. The difficulty of the attack means it would likely be carried out by nation-states or other entities with comparable resources and then only in highly targeted scenarios. The likelihood of such an attack being used widely in the wild is extremely low."
So it's not like "proxmark reader in a backpack, dude having a smoke outside the data center" level of cloning. :D