the additional "word(s)" that is added should never be seen as an additional security.
I'm not sure I agree with that.
As you say, the passphrase offers no additional security to your seed phrase - it does not encrypt it, and if someone gains access your seed phrase, then they still have complete access to your seed phrase (which is obviously not the case if your seed phrase was encrypted). It does, however, offer additional security to your private keys.
If you don't use a passphrase and someone gains access to your seed phrase, they also gain access to your private keys and your coins.
If you do use a passphrase and someone gains access to your seed phrase, they don't gain access to your private keys and your coins, unless they also gain access to your passphrase. By definition, that's more secure.
Yeah, no encryption but some extra add to the SEED entropy, I think. The more entropy of the SEED that controls private keys the more secure they are - correct me if I'm wrong with that.
Sort of. The passphrase doesn't change the entropy of your seed phrase. It will always be 128 or 256 bits, depending on whether it is 12 words or 24 words. The passphrase (if used) is used as part of the second parameter for PBKDF2 (your seed phrase being the first parameter) to generate your "root seed" number, which is then used to derive all your private keys, public keys, and addresses.