This is likely to significantly increase your risk of locking yourself out of your vault (by forgetting your master password), and/or increase your risk of vault compromise (by giving you an incentive to use a master password that is weak or non-unique, to aid memorization).
Even if you use a strong, randomly generated, and unique master password each time, and duly updates your Emergency Sheets, the practice of regularly rotating your master password typically offers negligible added protection for your vault. This is because a regularly scheduled password rotation only protects your account in case you happen to time your password change so that it falls exactly inside the time window between when an attacker steals your master password and when they use the stolen password for account take-over.
The diagram below illustrates the timing (assuming that you follow best practices of immediately changing your password on any evidence of a leak or compromise):
graph LR
root[Last<br>password<br>change] -->|ΔT<sub>1</sub>| A(Password<br>leak<br>event)
-->|ΔT<sub>2</sub>| B[Disclosure of<br>password leak]
--> C[Emergency<br>password change<br>(post-disclosure)]
A-->|ΔT<sub>3</sub>| D[Account<br>compromise<br>(using leaked password)]
-->E[Emergency<br>password change<br>(post-compromise)]
Basically, for a routine (regularly scheduled) password change to protect you, the account take-over attempt would need to occur before discovery/disclosure of the leak (ĪT2 > **ĪT3), and your regularly scheduled password change would need to occur precisely during the time interval ĪT2.
If the attackersā wait time from the acquisition of the password until its use (ĪT2) is Poisson-distributed with a mean time delay T, then rotating the password at an interval t will reduce the risk of an vault breach by a probability that is approximately equal to
p ā t /T
(approximation valid for small p only). Thus, to reduce the risk by a meaningful amount (say p < 0.01), then we need to set the rotation interval to a value
t < 0.01 T
Therefore, even if the average attacker were to wait a whole year (!) after stealing your master password before they try to breach your vault, you would need to rotate your master password twice a week for this to be an effective strategy.