Well a domain name is easier to remember than a few numbers…
True, but your WireGuard config is a static .conf file. Once your endpoint (IP or domain) is in there, you don't need to remember it anyway? Regardless, to answer your actual question in the OP, having a domain does no harm. If your static IP has a port open (eg for WireGuard), then that is the security risk (or lack of) over and done with. Having a domain further point to that IP doesn't add to the potential risk in any meaningful way; so don't worry about that.
WireGuard itself is a silent protocol, by design. If some bot tries to scan your IP (which they will, relentlessly - that's just the Internet for you) then your WireGuard service will remain silent as though it wasn't even installed. WireGuard will only reply to a properly formatted request over UDP on its operating port (51820 by default), and will further require the correct keys (and, optionally but highly recommended, PSK) to begin replying. I wouldn't worry about having WireGuard running 'exposed' at all, it's literally what it's designed for.
If you want to open other services, then I highly recommend at the least a reverse proxy (Caddy, Nginx Proxy Manager, Traefik et al.). Better yet, run cloudflared as suggested above, and configure Cloudflare Zero Trust on a free account. Add authentication with only your email permitted, so you can receive a code every 24h to be allowed to access your home services. That way, no ports are open on your router (except WireGuard) and all your other self hosted stuff is punched out from the inside via cloudflared and protected behind their own authentication and DDOS protection service. Win/win.