If your concern is that you'd expose the public key, post the SHA256 of it so anyone can verify it hashes down to the correct base58 address.
The public key is on the blockchain for this address so nothing to expose there.
It took me a minute to realize what you were suggesting-- perhaps because I knew the pubkey for that address was known-- so I thought I'd reiterate it for others who might also be confused:
A normal P2PKH address is RIPEMD160(SHA2(PUBKEY)). In cases where only the address is known because no outputs with that script have been spent, a personal could reveal knowledge of a SHA256 value that RIPEMD160s to the address. This would be strong evidence that they know the pubkey (or know someone who does at least!). But it would keep the pubkey itself private, which might be relevant if it were a special sort vulnerable to attack if it were known (e.g. vulnerable to a meet in the middle attack because the private key was selected from a known limited range).
It's moot here since anyone who cares to know can know the pubkey by looking at the blockchain:
https://www.blockstream.info/tx/99f44a1e654e57c0d9918d2d2df728093cde0ed9e768c50737b3b77a37a656fbOtherwise, if you can't do this, and since there are no reasons to not want to do this, as it is safe to do it, you should STFU, since it would mean you are obviously trolling or you want to scam somebody.
Indeed, there is a slow flood of scamming / market manipulation attempts based on false claims of having cracked some wallet or another. The whole purpose of this kind of cryptography is that it's trivial to prove you know a private key without revealing anything other than that fact. Any claim that doesn't come with that kind of proof is correctly ignored. Mankind's capacity to be scammed knows no bound, however.