And yes it is tamper proof on TREZOR's case. The big thing though which stops your idea on employee or someone getting wallet, is it's shipped as empty it's not till you actually go through install it has a wallet. You get 24 seed words that only you know during install. So until you install it literally contains no wallet.
Have you used a hardware wallet?
Here is some real hands on with some hardware wallets:
Trezor: https://bitcointalksearch.org/topic/hands-on-trezor-hardware-wallet-notlist3d-1298917
KeepKey: https://bitcointalksearch.org/topic/hands-on-keepkey-hardware-wallet-notlist3d-1283805
Ledger Nano: https://bitcointalksearch.org/topic/hands-on-ledger-nano-hardware-wallet-notlist3d-1305888
Actually you are the one who needs to do more research. Yes you are right the software that runs on it is mostly open source (no hardware wallet released so far is actually 100% open source, some have 99% of the code open source like the trezor but most don't have any part of the hardware open sourced, none of the ones you have linked are 100% code and hardware open source), however there are still many other worries. One thing that scares me a lot is that trezor hard an onboard RNG chip that is not open source and was completely designed and manufactured by a third party vendor, however it doesn't use this chip exclusively it combines it with random data from your PC so unless both are colluding you are safe. First of all unless you actually build the software from source and load it onto the device yourself how can you know what is running on it. How do you know that the device hasn't got some extra code that generates non random seed words, or even more hard to detect - non random R values, similar to the bug in blockchain.info before, or even code that transmits the seed words hidden in inside the tx data allowing the attacker to retrieve them from the blockchain after you push a tx. Even if you do load the code yourself it is still possible that some chip on the device is the thing that is backdoored and able to execute these kinds of attacks, this is called "hardware hacking". This is near impossible to detect. The US military has invested billions into trying to solve this problem and are able to detect backdoored chips by destructive testing by means that are not yet public however we do know that the chip is useless afterwards, so when they need to source chips from China or such they buy lots of chips and destroy 80% of them and if they find no backdoors they decide the remaining 20% are safe enough and those are the ones that end up in black hawk helicopters and other important things. So tl;dr; It is really hard to be sure your hardware wallet isn't backdoored. Unless you build it from bare silicon yourself there is trust involved.