No, it’s not secure. If the random nonce ok is revealed, the counterparty can calculate your personal key.
A Schnorr signature consists of two scalars (r,s). The place r is the x coordinate of a degree R generated from a random nonce ok. If I perceive you proper, you’re asking whether or not it’s secure to disclose this ok.
A Schnorr signature is generated within the following method:
- m: message
 - x: personal key
 - P: public key; 
P = x×G - ok: random nonce
 - R: random level; 
R = ok×G r = R.x(x coordinate of random level R)s = ok + hash(P,R,m)•x
If either side of the final equation are multiplied with the generator level G:
s = ok + hash(P,R,m)•x
s×G = (ok + hash(P,R,m)•x)×G
s×G = ok×G + hash(P,R,m)•x×G
s×G = R + hash(P,R,m)•P
So, any third social gathering can examine whether or not the signature is legitimate by plugging  (r,s), the message m from the context of the transaction, and the general public key P from both the prior output or the witness construction into:
s×G = R + hash(P,R,m)•P
If the equation holds, the signature proves that the signer knew the personal key x equivalent to the general public key P.
No, it isn’t secure to share ok, as a result of given ok the counterparty can resolve for the personal key on this equation solely composed of scalars:
x = (s - ok) / hash(P,R,m)
