This is difficult to solve in a secure way due to various platform limitations.
Currently we require a user interaction to ensure it was initiated by a user. If we remove this then any application on the computer could potentially retrieve the decryption key and use it to gain access to the vault data.