> I thought the 2FA all the big services have is so that they will deliver you your encrypted vault, rather than another layer of encryption?
Correct, 2FA is protection in addition to your password manager. So if someone gets your unsealed vault they cannot log into any services without also compromising your second factor. 2FA is not for further cryptographic hardening of the vault itself.
> The real threat is that you're putting your password for decryption into a proprietary blob with an internet connection and auto-updates enabled. It might be sending your password random places now or maybe at some later point.
If you use Chrome and Safari your passwords are going through a proprietary blob with an internet connection and auto-updates enabled. If you use extensions for your browser they likely can steal all of your passwords.
Nothing can protect you if you don't trust any of the code you're putting your secrets into, although 2FA with some USB devices cover a mind boggling range of threats. A keylogger and screen capture combined wouldn't be sufficient to bypass them.
> Note that even a source-available password manager doesn't really solve this issue if it's not self compiled
Are you compiling your browser from source after verifying every line of code it contains? If so what makes you think you can trust your compiler?
You have to trust something. Choose your threat model. Choose your risks. Live your life.