As all post-quantum crypto is relatively new there is still the risk of it being broken in the future. This is why we combine the new algorithms with classical ones in an hybrid approach so that the encryption stays at least as secure as it is now.
SIKE was known to be breakable since at least 1997, specific breaking algorithms were developed in 2000, and these were implemented in Magma (a symbolic algebra suite from John Cannon, Sydney Uni, second generation after the original Cayley system of the mid 1980s).
It wasn't a choice that would have been put forward by people in the abstract algebra game - just something put forward as a 'candidate' by security researchers.
Learn some math, more specifically learn abstract algebra | read current papers in the field, befriend people active in the field that have taken over from Charles Leedham-Green, George Havas, et al is good practical advice to avoid using methods already known for decades to be weak.
It answers the question.
> Learn some decency.
Little rude, given the question asked was answered.
How will you make sure this does not happen to the algorithms you chose?