...
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="31a26b772ad9a75f-3c41bd2b-4a344a7f-8e20a5a6-9bad94aeecef1cfadc3ab378"><ac:plain-text-body><![CDATA[ | [[Bloch 2008 | AA. Bibliography#Bloch 08]] | Item 39: Make defensive copies when needed | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="2c8859098c59a84b-cacc4a72-45584fae-bf1f99de-7aff36c5af6bc37a93c01f3c"><ac:plain-text-body><![CDATA[ | [[Pugh 2009 | AA. Bibliography#Pugh 09]] | Returning references to internal mutable state | ]]></ac:plain-text-body></ac:structured-macro> |
<ac:structured-macro ac:name="unmigrated-wiki-markup" ac:schema-version="1" ac:macro-id="198a300641f955ed-55c39b8b-4e424d25-80189045-fd5d68a108833e3c06a1d643"><ac:plain-text-body><![CDATA[ | [[SCG 20072009 | AA. Bibliography#SCG 0709]] | Guideline 2-1 2 Create a copy copies of mutable inputs and outputs | ]]></ac:plain-text-body></ac:structured-macro> |
...