If the decryption key is unavailable, the data is as good as wiped already, right? It's unreadable.
I'm guessing you're attempting to mitigate against a brute force attack. I think the 'stock' answer to that would be to ensure you're using a complicated enough pass phrase (I think the current best practice on this is >12 characters with the usual upper, lower, character, number combo can take thousands of years to crack, see here: https://www.security.org/how-secure-is-my-password/) or use a hardware token.
Doesn't LUKS lock out any attempts for 60 seconds after 3 attempts anyway? That's a huge blocker in the way for brute forcing. That's 180 attempts in an hour, 4320 a day, etc. It'll take a long time.
If you're truly looking to wipe, I think you'd need to execute something at the OS level once unlocked/booted to detect incorrect attempts (if attempt >3; then dd if=/dev/zero of=/dev/YourDevice bs=2M or similar).
Have a look at response 5.21 on why LUKS does not include the nuke option: https://gitlab.com/cryptsetup/cryptsetup/-/wikis/FrequentlyAskedQuestions