> So I am expressly asking about the SQL that Slick generates internally.
>
> I am curious if the same guarantees of imperviousness to SQL injection
> attacks are provided when using the direct embedding in Slick 2.0?
Should 100% safe from SQL injection to our knowledge (and otherwise it's
a bug). Slick understands the query code and its types. Slick knows what
are values and what are operators. (Potentially malicious) SQL code
contained in values never leaks out of them into the code, because Slick
escapes values appropriately.
> We do use the lifted embedding (at least now while we're using Slick
> 1.0.x) and I've gone to semi-heroic measures (made possible by the
> query munging code you supplied!) to avoid using "raw" SQL.
You are probably aware of this, but for completeness: if you replace the
SQL string the lifted embedding uses in that way, you of course have to
make sure that that string is safe.