You're revoking the attacker's key (that they're using to upload the docs to their own account), this is probably the best option available.
Obviously you have better methods to revoke your own keys.
it is less of a problem for revoking attacker's keys (but maybe it has access to victim's contents?).
agreed it shouldn't be used to revoke non-malicious/your own keys
it is less of a problem for revoking attacker's keys (but maybe it has access to victim's contents?).
agreed it shouldn't be used to revoke non-malicious/your own keys