Thanks for your concern regarding proper disclosure.
As this is more of a foot gun rather than explicitly a vulnerability in Ecto.SQL. Which has been publicly known since the introduction of the API, then I’m having a hard time seeing how this would fall into that category. I would love if you could expand on this.
As Ecto.SQL does not sanitize the iodata in any way, the user is left to do that job. Not something that I would expect for a high level library, or any ORM. Although it is quite common, probably due to the non trivial task of building a SQL lexer/parser.
Regardless of all of this, we can do better. And I believe we should!