My first question is, will this work as expected
No. You can't use multiple DNS providers together by just putting the union of NS
records in your zone and all nameservers at registry and hope it works.
All providers concerned need to cooperate to make sure to serve the exact same zone in the exact same way. Which most of the time means either an hidden primary distribution nameserver that feeds both providers, or one provider fetching zone from the other one (which case lessens tremendously the usefulness of having multiple providers).
If you do throw DNSSEC into the mix, then providers cooperation is absolutely mandatory if you hope your domain to resolve properly.
So, instead of trying things in random, you should first start by approaching any single DNS provider and ask it what solution does it have for a multi-provider setup, either hot/hot or hot/cold scenario and things like that.
I thought I might find a docker that pulls my CloudFlare zones VIA API and updated a local bind9 or similar
That seems the second scenario and seriously lowers the interest of the setup. Why do you think this is useful or more important what kind of problems you think you are solving with this? Is it maybe "oh Cloudflare might have DDOS and hence me having a backup nameserver will help"? If so, and if Cloudflare has a DDOS you really think your lone nameserver will be able to handle the load too? I doubt it.
I think I would need to configure a authoritative server.
If you are at this level of questioning, and hence not yet fully understanding the difference between a recursive and authoritative nameserver, I strongly recommend, even if you won't like that answer, to just stay off DNS for now. Use any decent DNS provider for your important production zones, WHILE you can on your side play with other non important zones, set up things on your local network, debug things, try options, etc. After which you should get a better understanding on how DNS work and then maybe work towards more advanced scenario.
In the meantime your efforts should be more spent towards basic securing like:
- testing your zones with DNSViz online and making sure you have no warnings
- enabling DNSSEC on your zones and making sure all cases are accounted for (keys rotation, etc.).