Then your method is even worse; you still don't deal with the issue of that the malicious party actually HAS your vault. Again, it's a workaround to the problem; you're mitigating any further ways to access your vault, but don't resolve the issue that they already have physical hands on your vault. Your issue resolves the former problem, but not the latter. It is the latter that is the concern, because without the latter problem (the issue of them having physical hands on your vault), you wouldn't have to try to mitigate the problem. that method would effectively be drawing a newer line in the sand behind the first line.
This is like saying you wouldn't have to have fire insurance if the world were perfect. Ok, well guess what? We don't live in a perfect world. No system is completely secure - no, not even your own local system.
People said the same about Lastpass, Passwordstate, and others. Look at what happened.
Most wouldn't want to take that risk, and that risk is the crux of the problem.
BL.
I googled the first one, and found this:

Cybersecurity Education & Terminology - LastPass
Learn the basics of cybersecurity education and terms so you can prevent and respond to habits to better protect yourself and your business.