Someone who knew or guessed that you were doing it could find your key very quickly by trying out every beacon value in the time range your key was generated in
Many exploited systems have effectively done this. A random number generator is seeded with something like "PID + timestamp + milliseconds since system startup." But all these numbers cluster in a small range, so it's practical to test all of them and figure out the seed.
As a thought experiment what would happen if you did this?