9
0
mirror of https://github.com/VolmitSoftware/Iris.git synced 2025-12-23 17:19:16 +00:00
This commit is contained in:
Daniel Mills
2020-09-04 20:59:13 -04:00
parent fbc02881d7
commit b158ea9e78
31 changed files with 434 additions and 3538 deletions

Binary file not shown.

Binary file not shown.

View File

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

File diff suppressed because it is too large Load Diff

View File

@@ -1,213 +0,0 @@
In class com.google.gson.FieldAttributes
in method public java.lang.String getName()
java.lang.reflect.Field.getName()
In class com.google.gson.FieldNamingPolicy$1
in method public java.lang.String translateName(java.lang.reflect.Field)
java.lang.reflect.Field.getName()
In class com.google.gson.FieldNamingPolicy$2
in method public java.lang.String translateName(java.lang.reflect.Field)
java.lang.reflect.Field.getName()
In class com.google.gson.FieldNamingPolicy$3
in method public java.lang.String translateName(java.lang.reflect.Field)
java.lang.reflect.Field.getName()
In class com.google.gson.FieldNamingPolicy$4
in method public java.lang.String translateName(java.lang.reflect.Field)
java.lang.reflect.Field.getName()
In class com.google.gson.FieldNamingPolicy$5
in method public java.lang.String translateName(java.lang.reflect.Field)
java.lang.reflect.Field.getName()
In class com.google.gson.FieldNamingPolicy$6
in method public java.lang.String translateName(java.lang.reflect.Field)
java.lang.reflect.Field.getName()
In class com.google.gson.internal.$Gson$Types
in method public static java.lang.Class getRawType(java.lang.reflect.Type)
java.lang.Class.getName()
in method public static java.lang.String typeToString(java.lang.reflect.Type)
java.lang.Class.getName()
In class com.google.gson.internal.LinkedHashTreeMap
in method com.google.gson.internal.LinkedHashTreeMap$Node find(java.lang.Object, boolean)
java.lang.Class.getName()
In class com.google.gson.internal.LinkedTreeMap
in method com.google.gson.internal.LinkedTreeMap$Node find(java.lang.Object, boolean)
java.lang.Class.getName()
In class com.google.gson.internal.UnsafeAllocator
in method public static com.google.gson.internal.UnsafeAllocator create()
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
in method static void assertInstantiable(java.lang.Class)
java.lang.Class.getName()
java.lang.Class.getName()
In class com.google.gson.internal.bind.JsonAdapterAnnotationTypeAdapterFactory
in method com.google.gson.TypeAdapter getTypeAdapter(com.google.gson.internal.ConstructorConstructor, com.google.gson.Gson, com.google.gson.reflect.TypeToken, com.google.gson.annotations.JsonAdapter)
java.lang.Class.getName()
In class com.google.gson.internal.bind.TypeAdapters$1
in method public void write(com.google.gson.stream.JsonWriter, java.lang.Class)
java.lang.Class.getName()
In class com.google.gson.internal.bind.TypeAdapters$32
in method public java.lang.String toString()
java.lang.Class.getName()
In class com.google.gson.internal.bind.TypeAdapters$33
in method public java.lang.String toString()
java.lang.Class.getName()
java.lang.Class.getName()
In class com.google.gson.internal.bind.TypeAdapters$34
in method public java.lang.String toString()
java.lang.Class.getName()
java.lang.Class.getName()
In class com.google.gson.internal.bind.TypeAdapters$35
in method public java.lang.String toString()
java.lang.Class.getName()
In class com.google.gson.internal.bind.TypeAdapters$35$1
in method public java.lang.Object read(com.google.gson.stream.JsonReader)
java.lang.Class.getName()
java.lang.Class.getName()
In class com.google.gson.internal.bind.TypeAdapters$EnumTypeAdapter
in method public TypeAdapters$EnumTypeAdapter(java.lang.Class)
java.lang.Class.getField(java.lang.String)
In class com.google.gson.internal.bind.util.ISO8601Utils
in method public static java.util.Date parse(java.lang.String, java.text.ParsePosition)
java.lang.Class.getName()
In class com.google.gson.internal.reflect.UnsafeReflectionAccessor
in method boolean makeAccessibleWithUnsafe(java.lang.reflect.AccessibleObject)
java.lang.Class.getMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getMethod(java.lang.String, java.lang.Class[])
In class com.google.gson.reflect.TypeToken
in method private static java.lang.AssertionError buildUnexpectedTypeError(java.lang.reflect.Type, java.lang.Class[])
java.lang.Class.getName()
java.lang.Class.getName()
In class com.volmit.iris.ProjectManager
in method public com.volmit.iris.util.JSONObject getSchemaFor(java.lang.Class, int, com.volmit.iris.util.KMap, com.volmit.iris.IrisDataManager)
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
in method private void verify(com.volmit.iris.util.JSONObject, java.lang.Object, com.volmit.iris.util.KList, java.io.File)
java.lang.Class.getDeclaredField(java.lang.String)
in method public com.volmit.iris.util.KList analyze(java.lang.Object, java.io.File)
java.lang.Class.getDeclaredField(java.lang.String)
In class com.volmit.iris.gen.PostBlockChunkGenerator
in method public void onInit(org.bukkit.World, com.volmit.iris.util.RNG)
java.lang.Class.getConstructor(java.lang.Class[])
In class com.volmit.iris.object.IrisEnchantment
in method public org.bukkit.enchantments.Enchantment getEnchant()
java.lang.reflect.Field.getName()
In class com.volmit.iris.util.FastReflection
in method public static java.lang.Class nmsClass(java.lang.String)
java.lang.Class.forName(java.lang.String)
in method public static java.lang.Class obcClass(java.lang.String)
java.lang.Class.forName(java.lang.String)
in method public static java.util.Optional optionalClass(java.lang.String)
java.lang.Class.forName(java.lang.String)
in method static
java.lang.Package.getName()
In class com.volmit.iris.util.JSONObject
in method public JSONObject(java.lang.Object, java.lang.String[])
java.lang.Class.getField(java.lang.String)
in method public static java.lang.String[] getNames(java.lang.Object)
java.lang.reflect.Field.getName()
in method private void populateMap(java.lang.Object)
java.lang.reflect.Method.getName()
in method public static java.lang.Object wrap(java.lang.Object)
java.lang.Package.getName()
In class com.volmit.iris.util.JarScanner
in method public void scan()
java.lang.Class.forName(java.lang.String)
In class com.volmit.iris.util.MortarCommand
in method private com.volmit.iris.util.KList buildChildren()
java.lang.Class.getConstructor(java.lang.Class[])
In class com.volmit.iris.util.MortarPermission
in method public MortarPermission()
java.lang.Class.getConstructor(java.lang.Class[])
In class com.volmit.iris.util.MortarPlugin
in method private void registerPermissions()
java.lang.Class.getConstructor(java.lang.Class[])
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
in method private void registerControllers()
java.lang.Class.getConstructor(java.lang.Class[])
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
in method private void registerInstance()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
in method private void unregisterInstance()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
in method private void registerCommands()
java.lang.Class.getConstructor(java.lang.Class[])
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
In class com.volmit.iris.util.NBTUtils
in method public static java.lang.String getTypeName(java.lang.Class)
java.lang.Class.getName()
in method public static int getTypeCode(java.lang.Class)
java.lang.Class.getName()
In class com.volmit.iris.util.NMSVersion
in method private static boolean tryVersion(java.lang.String)
java.lang.Class.forName(java.lang.String)
In class com.volmit.iris.util.ParticleSenderLegacy
in method static
java.lang.Class.getMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getConstructor(java.lang.Class[])
java.lang.Class.getConstructor(java.lang.Class[])
java.lang.Class.getField(java.lang.String)
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
In class com.volmit.iris.util.Violator
in method private static java.lang.String id(java.lang.Object, java.lang.Object)
java.lang.reflect.Method.getName()
java.lang.reflect.Field.getName()
in method public static java.lang.reflect.Constructor getConstructor(java.lang.Class, java.lang.Class[])
java.lang.Class.getConstructor(java.lang.Class[])
in method public static java.lang.reflect.Field getField(java.lang.Class, java.lang.String)
java.lang.Class.getField(java.lang.String)
java.lang.Class.getField(java.lang.String)
in method public static java.lang.reflect.Field getDeclaredField(java.lang.Class, java.lang.String)
java.lang.Class.getDeclaredField(java.lang.String)
java.lang.Class.getDeclaredField(java.lang.String)
in method public static java.lang.reflect.Method getMethod(java.lang.Class, java.lang.String, java.lang.Class[])
java.lang.Class.getMethod(java.lang.String, java.lang.Class[])
in method public static java.lang.reflect.Method getDeclaredMethod(java.lang.Class, java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
In class com.volmit.iris.util.VirtualCommand
in method public VirtualCommand(com.volmit.iris.util.ICommand, java.lang.String)
java.lang.Class.getConstructor(java.lang.Class[])
java.lang.reflect.Field.getName()
In class org.slf4j.LoggerFactory
in method public static org.slf4j.Logger getLogger(java.lang.Class)
java.lang.Class.getName()
In class org.slf4j.helpers.MarkerIgnoringBase
in method public java.lang.String toString()
java.lang.Class.getName()
In class org.slf4j.helpers.MessageFormatter
in method private static void safeObjectAppend(java.lang.StringBuffer, java.lang.Object)
java.lang.Class.getName()
In class org.zeroturnaround.zip.ZTZipReflectionUtil
in method static java.lang.reflect.Method getDeclaredMethod(java.lang.Class, java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
In class org.zeroturnaround.zip.ZipFileUtil
in method static java.util.zip.ZipInputStream createZipInputStream(java.io.InputStream, java.nio.charset.Charset)
java.lang.Class.getConstructor(java.lang.Class[])
in method static java.util.zip.ZipOutputStream createZipOutputStream(java.io.BufferedOutputStream, java.nio.charset.Charset)
java.lang.Class.getConstructor(java.lang.Class[])
in method static java.util.zip.ZipFile getZipFile(java.io.File, java.nio.charset.Charset)
java.lang.Class.getConstructor(java.lang.Class[])
in method static boolean isCharsetSupported()
java.lang.Class.getConstructor(java.lang.Class[])
In class org.zeroturnaround.zip.extra.ExtraFieldUtils
in method public static org.zeroturnaround.zip.extra.ZipExtraField createExtraField(org.zeroturnaround.zip.extra.ZipShort)
java.lang.Class.newInstance()

View File

@@ -1,805 +0,0 @@
[2020.08.31 16:32:03] Using "C:\Program Files\Java\jre1.8.0_221\lib\resources.jar;C:\Program Files\Java\jre1.8.0_221\lib\rt.jar;C:\Program Files\Java\jre1.8.0_221\lib\jsse.jar;C:\Program Files\Java\jre1.8.0_221\lib\jce.jar;C:\Program Files\Java\jre1.8.0_221\lib\charsets.jar;C:\Program Files\Java\jre1.8.0_221\lib\jfr.jar" as path to java.lang.Object (D)
[2020.08.31 16:32:03] Zelix KlassMaster 13.0.0
Unlimited
Copyright 1997-2019 Zelix Pty Ltd (47 078 740 093)
All rights reserved
[2020.08.31 16:32:03] Preprocessing ZKM Script file "C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\script.zkm"
[2020.08.31 16:32:03] Parsing ZKM Script file "C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\script.zkm"
[2020.08.31 16:32:04] Setting classpath to "C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\ZKM.jar;C:\Program Files\Java\jre1.8.0_221\lib\resources.jar;C:\Program Files\Java\jre1.8.0_221\lib\rt.jar;C:\Program Files\Java\jre1.8.0_221\lib\jsse.jar;C:\Program Files\Java\jre1.8.0_221\lib\jce.jar;C:\Program Files\Java\jre1.8.0_221\lib\charsets.jar;C:\Program Files\Java\jre1.8.0_221\lib\jfr.jar;C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\bungeecord-api.jar;C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\lombok-1.18.10.jar;C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\slf4j-simp.jar;C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\spigot-api-1.16.1.jar;C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\spigot.jar"
[2020.08.31 16:32:04] Opening classes...
API calls detected that may not be handled automatically...
In class com.volmit.iris.ProjectManager
in method public com.volmit.iris.util.JSONObject getSchemaFor(java.lang.Class, int, com.volmit.iris.util.KMap, com.volmit.iris.IrisDataManager)
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
in method private void verify(com.volmit.iris.util.JSONObject, java.lang.Object, com.volmit.iris.util.KList, java.io.File)
java.lang.Class.getDeclaredField(java.lang.String)
in method public com.volmit.iris.util.KList analyze(java.lang.Object, java.io.File)
java.lang.Class.getDeclaredField(java.lang.String)
In class com.volmit.iris.object.IrisEnchantment
in method public org.bukkit.enchantments.Enchantment getEnchant()
java.lang.reflect.Field.getName()
In class com.volmit.iris.util.FastReflection
in method public static java.lang.Class nmsClass(java.lang.String)
java.lang.Class.forName(java.lang.String)
in method public static java.lang.Class obcClass(java.lang.String)
java.lang.Class.forName(java.lang.String)
in method public static java.util.Optional optionalClass(java.lang.String)
java.lang.Class.forName(java.lang.String)
in method static
java.lang.Package.getName()
In class com.volmit.iris.util.JSONObject
in method public JSONObject(java.lang.Object, java.lang.String[])
java.lang.Class.getField(java.lang.String)
in method public static java.lang.String[] getNames(java.lang.Object)
java.lang.reflect.Field.getName()
in method private void populateMap(java.lang.Object)
java.lang.reflect.Method.getName()
in method public static java.lang.Object wrap(java.lang.Object)
java.lang.Package.getName()
In class com.volmit.iris.util.JarScanner
in method public void scan()
java.lang.Class.forName(java.lang.String)
In class com.volmit.iris.util.MortarCommand
in method private com.volmit.iris.util.KList buildChildren()
java.lang.Class.getConstructor(java.lang.Class[])
In class com.volmit.iris.util.MortarPermission
in method public MortarPermission()
java.lang.Class.getConstructor(java.lang.Class[])
In class com.volmit.iris.util.MortarPlugin
in method private void registerPermissions()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.Class.getConstructor(java.lang.Class[])
in method private void registerControllers()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.Class.getConstructor(java.lang.Class[])
in method private void registerInstance()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
in method private void unregisterInstance()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
in method private void registerCommands()
java.lang.reflect.Field.getName()
java.lang.reflect.Field.getName()
java.lang.Class.getConstructor(java.lang.Class[])
In class com.volmit.iris.util.NBTUtils
in method public static java.lang.String getTypeName(java.lang.Class)
java.lang.Class.getName()
in method public static int getTypeCode(java.lang.Class)
java.lang.Class.getName()
In class com.volmit.iris.util.NMSVersion
in method private static boolean tryVersion(java.lang.String)
java.lang.Class.forName(java.lang.String)
In class com.volmit.iris.util.ParticleSenderLegacy
in method static
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
java.lang.Class.getField(java.lang.String)
java.lang.Class.getConstructor(java.lang.Class[])
java.lang.Class.getConstructor(java.lang.Class[])
java.lang.Class.getMethod(java.lang.String, java.lang.Class[])
In class com.volmit.iris.util.Violator
in method private static java.lang.String id(java.lang.Object, java.lang.Object)
java.lang.reflect.Method.getName()
java.lang.reflect.Field.getName()
in method public static java.lang.reflect.Constructor getConstructor(java.lang.Class, java.lang.Class[])
java.lang.Class.getConstructor(java.lang.Class[])
in method public static java.lang.reflect.Field getField(java.lang.Class, java.lang.String)
java.lang.Class.getField(java.lang.String)
java.lang.Class.getField(java.lang.String)
in method public static java.lang.reflect.Field getDeclaredField(java.lang.Class, java.lang.String)
java.lang.Class.getDeclaredField(java.lang.String)
java.lang.Class.getDeclaredField(java.lang.String)
in method public static java.lang.reflect.Method getMethod(java.lang.Class, java.lang.String, java.lang.Class[])
java.lang.Class.getMethod(java.lang.String, java.lang.Class[])
in method public static java.lang.reflect.Method getDeclaredMethod(java.lang.Class, java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
In class com.volmit.iris.util.VirtualCommand
in method public VirtualCommand(com.volmit.iris.util.ICommand, java.lang.String)
java.lang.reflect.Field.getName()
java.lang.Class.getConstructor(java.lang.Class[])
In class org.slf4j.LoggerFactory
in method public static org.slf4j.Logger getLogger(java.lang.Class)
java.lang.Class.getName()
In class org.slf4j.helpers.MarkerIgnoringBase
in method public java.lang.String toString()
java.lang.Class.getName()
In class org.slf4j.helpers.MessageFormatter
in method private static void safeObjectAppend(java.lang.StringBuffer, java.lang.Object)
java.lang.Class.getName()
In class org.zeroturnaround.zip.ZTZipReflectionUtil
in method static java.lang.reflect.Method getDeclaredMethod(java.lang.Class, java.lang.String, java.lang.Class[])
java.lang.Class.getDeclaredMethod(java.lang.String, java.lang.Class[])
In class org.zeroturnaround.zip.ZipFileUtil
in method static java.util.zip.ZipInputStream createZipInputStream(java.io.InputStream, java.nio.charset.Charset)
java.lang.Class.getConstructor(java.lang.Class[])
in method static java.util.zip.ZipOutputStream createZipOutputStream(java.io.BufferedOutputStream, java.nio.charset.Charset)
java.lang.Class.getConstructor(java.lang.Class[])
in method static java.util.zip.ZipFile getZipFile(java.io.File, java.nio.charset.Charset)
java.lang.Class.getConstructor(java.lang.Class[])
in method static boolean isCharsetSupported()
java.lang.Class.getConstructor(java.lang.Class[])
In class org.zeroturnaround.zip.extra.ExtraFieldUtils
in method public static org.zeroturnaround.zip.extra.ZipExtraField createExtraField(org.zeroturnaround.zip.extra.ZipShort)
java.lang.Class.newInstance()
559 classes opened in 1 seconds. 120216K of memory used. 11879K of memory free.
[2020.08.31 16:32:06] Setting trim exclusions...
[2020.08.31 16:32:06] Trimming...
Using internal default trim exclusions. File 'C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\defaultTrimExclude.txt' not found
[2020.08.31 16:32:07] Setting exclusions...
[2020.08.31 16:32:07] Obfuscating classes...
Using internal default exclusions. File 'C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\defaultExclude.txt' not found
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.CellularNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.StringBuilder builder'=>'java.lang.StringBuilder a' in class 'org.zeroturnaround.zip.commons.StringBuilderWriter'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'byte[] height'=>'byte[] a' in class 'com.volmit.iris.util.HeightMap'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.io.DataOutputStream os'=>'java.io.DataOutputStream a' in class 'com.volmit.iris.util.NBTOutputStream'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String a'=>'java.lang.String c' in class 'com.volmit.iris.util.MortarPlugin'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap commands'=>'com.volmit.iris.util.KMap d' in class 'com.volmit.iris.util.MortarPlugin'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.lang.Object OWNER_READ'=>'java.lang.Object i' in class 'org.zeroturnaround.zip.Java7Nio2ApiPermissionsStrategy'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.lang.Object GROUP_READ'=>'java.lang.Object j' in class 'org.zeroturnaround.zip.Java7Nio2ApiPermissionsStrategy'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.lang.Class filesClass'=>'java.lang.Class m' in class 'org.zeroturnaround.zip.Java7Nio2ApiPermissionsStrategy'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.lang.Class pathClass'=>'java.lang.Class c' in class 'org.zeroturnaround.zip.Java7Nio2ApiPermissionsStrategy'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean isDirectory'=>'boolean c' in class 'org.zeroturnaround.zip.ZTFilePermissions'. Given that the prefix 'is' is common, only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long index'=>'long e' in class 'com.volmit.iris.util.JSONTokener'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'char previous'=>'char a' in class 'com.volmit.iris.util.JSONTokener'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean eof'=>'boolean f' in class 'com.volmit.iris.util.JSONTokener'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long line'=>'long g' in class 'com.volmit.iris.util.JSONTokener'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.io.Reader reader'=>'java.io.Reader d' in class 'com.volmit.iris.util.JSONTokener'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'long character'=>'long c' in class 'com.volmit.iris.util.JSONTokener'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int xc'=>'int a' in class 'com.volmit.iris.util.TaskExecutor'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.concurrent.ExecutorService service'=>'java.util.concurrent.ExecutorService b' in class 'com.volmit.iris.util.TaskExecutor'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.FractalCubicNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.command.CommandExecutor ex'=>'org.bukkit.command.CommandExecutor a' in class 'com.volmit.iris.util.RouterCommand'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String usage'=>'java.lang.String b' in class 'com.volmit.iris.util.RouterCommand'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.GlobNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String[] a'=>'java.lang.String[] d' in class 'com.volmit.iris.gen.post.PostWallPatcher'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RNG rng'=>'com.volmit.iris.util.RNG e' in class 'com.volmit.iris.gen.post.PostWallPatcher'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.CNG fracture'=>'com.volmit.iris.noise.CNG m' in class 'com.volmit.iris.noise.CNG'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double down'=>'double i' in class 'com.volmit.iris.noise.CNG'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double scale'=>'double f' in class 'com.volmit.iris.noise.CNG'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double patch'=>'double o' in class 'com.volmit.iris.noise.CNG'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RNG rng'=>'com.volmit.iris.util.RNG e' in class 'com.volmit.iris.noise.CNG'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double power'=>'double j' in class 'com.volmit.iris.noise.CNG'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double up'=>'double d' in class 'com.volmit.iris.noise.CNG'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.NoiseInjector injector'=>'com.volmit.iris.util.NoiseInjector n' in class 'com.volmit.iris.noise.CNG'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int oct'=>'int l' in class 'com.volmit.iris.noise.CNG'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean noscale'=>'boolean k' in class 'com.volmit.iris.noise.CNG'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList children'=>'com.volmit.iris.util.KList c' in class 'com.volmit.iris.noise.CNG'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.NoiseGenerator generator'=>'com.volmit.iris.noise.NoiseGenerator a' in class 'com.volmit.iris.noise.CNG'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double fscale'=>'double g' in class 'com.volmit.iris.noise.CNG'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'double bakedScale'=>'double h' in class 'com.volmit.iris.noise.CNG'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double opacity'=>'double b' in class 'com.volmit.iris.noise.CNG'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'long interval'=>'long a' in class 'com.volmit.iris.util.ChronoLatch'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long since'=>'long b' in class 'com.volmit.iris.util.ChronoLatch'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double max'=>'double h' in class 'com.volmit.iris.util.RollingSequence'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double median'=>'double e' in class 'com.volmit.iris.util.RollingSequence'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double min'=>'double g' in class 'com.volmit.iris.util.RollingSequence'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean precision'=>'boolean j' in class 'com.volmit.iris.util.RollingSequence'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStructureSave save'=>'com.volmit.iris.command.CommandIrisStructureSave l' in class 'com.volmit.iris.command.CommandIrisStructure'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStructureClose close'=>'com.volmit.iris.command.CommandIrisStructureClose k' in class 'com.volmit.iris.command.CommandIrisStructure'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStructureMore more'=>'com.volmit.iris.command.CommandIrisStructureMore j' in class 'com.volmit.iris.command.CommandIrisStructure'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStructureCreate create'=>'com.volmit.iris.command.CommandIrisStructureCreate i' in class 'com.volmit.iris.command.CommandIrisStructure'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStructureOpen open'=>'com.volmit.iris.command.CommandIrisStructureOpen h' in class 'com.volmit.iris.command.CommandIrisStructure'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStructureVariants variants'=>'com.volmit.iris.command.CommandIrisStructureVariants g' in class 'com.volmit.iris.command.CommandIrisStructure'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStructureExpand expand'=>'com.volmit.iris.command.CommandIrisStructureExpand m' in class 'com.volmit.iris.command.CommandIrisStructure'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String value'=>'java.lang.String b' in class 'com.volmit.iris.util.StringTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.World world'=>'org.bukkit.World b' in class 'com.volmit.iris.gen.atomics.AtomicWorldData'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap lastChunk'=>'com.volmit.iris.util.KMap g' in class 'com.volmit.iris.gen.atomics.AtomicWorldData'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long last'=>'long h' in class 'com.volmit.iris.gen.atomics.AtomicWorldData'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap lastRegion'=>'com.volmit.iris.util.KMap a' in class 'com.volmit.iris.gen.atomics.AtomicWorldData'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String prefix'=>'java.lang.String d' in class 'com.volmit.iris.gen.atomics.AtomicWorldData'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.Cuboid$CuboidDirection[] $VALUES'=>'com.volmit.iris.util.Cuboid$CuboidDirection[] a' in class 'com.volmit.iris.util.Cuboid$CuboidDirection'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList EMPTY'=>'com.volmit.iris.util.KList a' in class 'com.volmit.iris.gen.layer.GenLayerCave'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise gg'=>'com.volmit.iris.noise.FastNoise b' in class 'com.volmit.iris.gen.layer.GenLayerCave'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList noLoot'=>'com.volmit.iris.util.KList h' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache dimCache'=>'com.volmit.iris.gen.atomics.AtomicCache f' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.BlockPosition allowLoot'=>'com.volmit.iris.util.BlockPosition d' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.IrisDataManager data'=>'com.volmit.iris.IrisDataManager a' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicMulticache cache'=>'com.volmit.iris.gen.atomics.AtomicMulticache b' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean fastPregen'=>'boolean c' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.MortarPlugin[] a'=>'com.volmit.iris.util.MortarPlugin[] e' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache spot'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisRegionRidge'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache ridge'=>'com.volmit.iris.gen.atomics.AtomicCache b' in class 'com.volmit.iris.object.IrisRegionRidge'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap watchers'=>'com.volmit.iris.util.KMap f' in class 'com.volmit.iris.util.FolderWatcher'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList changed'=>'com.volmit.iris.util.KList g' in class 'com.volmit.iris.util.FolderWatcher'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList deleted'=>'com.volmit.iris.util.KList d' in class 'com.volmit.iris.util.FolderWatcher'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList created'=>'com.volmit.iris.util.KList e' in class 'com.volmit.iris.util.FolderWatcher'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$FractalType[] $VALUES'=>'com.volmit.iris.noise.FastNoise$FractalType[] a' in class 'com.volmit.iris.noise.FastNoise$FractalType'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int threads'=>'int j' in class 'com.volmit.iris.gen.ParallelChunkGenerator'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.GroupedExecutor accelerant'=>'com.volmit.iris.util.GroupedExecutor i' in class 'com.volmit.iris.gen.ParallelChunkGenerator'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'char[] CHARGEN'=>'char[] b' in class 'com.volmit.iris.util.RNG'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long sx'=>'long a' in class 'com.volmit.iris.util.RNG'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList tasks'=>'com.volmit.iris.util.KList a' in class 'com.volmit.iris.util.TaskExecutor$TaskGroup'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.TaskExecutor e'=>'com.volmit.iris.util.TaskExecutor b' in class 'com.volmit.iris.util.TaskExecutor$TaskGroup'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.MortarPermission parent'=>'com.volmit.iris.util.MortarPermission a' in class 'com.volmit.iris.util.MortarPermission'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String name'=>'java.lang.String a' in class 'com.volmit.iris.util.Tag'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache cellGen'=>'com.volmit.iris.gen.atomics.AtomicCache d' in class 'com.volmit.iris.object.IrisGenerator'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisWhatHand hand'=>'com.volmit.iris.command.CommandIrisWhatHand g' in class 'com.volmit.iris.command.CommandIrisWhat'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisWhatBlock block'=>'com.volmit.iris.command.CommandIrisWhatBlock h' in class 'com.volmit.iris.command.CommandIrisWhat'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.WindowResolution[] $VALUES'=>'com.volmit.iris.util.WindowResolution[] b' in class 'com.volmit.iris.util.WindowResolution'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int width'=>'int c' in class 'com.volmit.iris.util.WindowResolution'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'int maxHeight'=>'int d' in class 'com.volmit.iris.util.WindowResolution'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.event.inventory.InventoryType type'=>'org.bukkit.event.inventory.InventoryType a' in class 'com.volmit.iris.util.WindowResolution'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.StructureTileCondition[] $VALUES'=>'com.volmit.iris.object.StructureTileCondition[] a' in class 'com.volmit.iris.object.StructureTileCondition'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'byte[] SIMPLEX_4D'=>'byte[] j' in class 'com.volmit.iris.noise.FastNoise'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String[] a'=>'java.lang.String[] m' in class 'com.volmit.iris.noise.FastNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$Interp m_interp'=>'com.volmit.iris.noise.FastNoise$Interp e' in class 'com.volmit.iris.noise.FastNoise'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$Float3[] GRAD_3D'=>'com.volmit.iris.noise.FastNoise$Float3[] p' in class 'com.volmit.iris.noise.FastNoise'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$Float2[] GRAD_2D'=>'com.volmit.iris.noise.FastNoise$Float2[] l' in class 'com.volmit.iris.noise.FastNoise'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int m_seed'=>'int s' in class 'com.volmit.iris.noise.FastNoise'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$Float2[] CELL_2D'=>'com.volmit.iris.noise.FastNoise$Float2[] r' in class 'com.volmit.iris.noise.FastNoise'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$Float3[] CELL_3D'=>'com.volmit.iris.noise.FastNoise$Float3[] k' in class 'com.volmit.iris.noise.FastNoise'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'float m_gain'=>'float c' in class 'com.volmit.iris.noise.FastNoise'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'int m_octaves'=>'int d' in class 'com.volmit.iris.noise.FastNoise'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String tag'=>'java.lang.String c' in class 'com.volmit.iris.util.MortarSender'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.command.CommandSender s'=>'org.bukkit.command.CommandSender a' in class 'com.volmit.iris.util.MortarSender'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String command'=>'java.lang.String b' in class 'com.volmit.iris.util.MortarSender'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisEditBiome ebiome'=>'com.volmit.iris.command.CommandIrisEditBiome s' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStudioOpen open'=>'com.volmit.iris.command.CommandIrisStudioOpen l' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisGoto got0'=>'com.volmit.iris.command.CommandIrisGoto j' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisHotload hotload'=>'com.volmit.iris.command.CommandIrisHotload p' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStudioUpdate update'=>'com.volmit.iris.command.CommandIrisStudioUpdate m' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStudioList list'=>'com.volmit.iris.command.CommandIrisStudioList i' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStudioClose close'=>'com.volmit.iris.command.CommandIrisStudioClose g' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStudioCreate create'=>'com.volmit.iris.command.CommandIrisStudioCreate u' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisMap map'=>'com.volmit.iris.command.CommandIrisMap h' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisPregen pregen'=>'com.volmit.iris.command.CommandIrisPregen o' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisTC tc'=>'com.volmit.iris.command.CommandIrisTC v' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisMetrics metrics'=>'com.volmit.iris.command.CommandIrisMetrics q' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisPregen world'=>'com.volmit.iris.command.CommandIrisPregen n' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStudioVerify verify'=>'com.volmit.iris.command.CommandIrisStudioVerify r' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisLoot loot'=>'com.volmit.iris.command.CommandIrisLoot k' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStudioPackage pkg'=>'com.volmit.iris.command.CommandIrisStudioPackage t' in class 'com.volmit.iris.command.CommandIrisStudio'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.CubicNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int[] a'=>'int[] b' in class 'com.volmit.iris.util.KList'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'short value'=>'short b' in class 'com.volmit.iris.util.ShortTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.concurrent.atomic.AtomicInteger z'=>'java.util.concurrent.atomic.AtomicInteger d' in class 'com.volmit.iris.gen.atomics.AtomicMulticache'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.concurrent.atomic.AtomicInteger x'=>'java.util.concurrent.atomic.AtomicInteger f' in class 'com.volmit.iris.gen.atomics.AtomicMulticache'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap rawBiome'=>'com.volmit.iris.util.KMap b' in class 'com.volmit.iris.gen.atomics.AtomicMulticache'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap height'=>'com.volmit.iris.util.KMap c' in class 'com.volmit.iris.gen.atomics.AtomicMulticache'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap region'=>'com.volmit.iris.util.KMap a' in class 'com.volmit.iris.gen.atomics.AtomicMulticache'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap biome'=>'com.volmit.iris.util.KMap e' in class 'com.volmit.iris.gen.atomics.AtomicMulticache'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisStructureTile tile'=>'com.volmit.iris.object.IrisStructureTile a' in class 'com.volmit.iris.util.IrisStructureResult'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisStructure structure'=>'com.volmit.iris.object.IrisStructure b' in class 'com.volmit.iris.util.IrisStructureResult'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int a'=>'int b' in class 'org.zeroturnaround.zip.ZipException'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.text.NumberFormat NF'=>'java.text.NumberFormat d' in class 'com.volmit.iris.util.Form'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String[] NAMES'=>'java.lang.String[] e' in class 'com.volmit.iris.util.Form'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.text.DecimalFormat DF'=>'java.text.DecimalFormat b' in class 'com.volmit.iris.util.Form'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.math.BigInteger THOUSAND'=>'java.math.BigInteger a' in class 'com.volmit.iris.util.Form'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.NavigableMap MAP'=>'java.util.NavigableMap c' in class 'com.volmit.iris.util.Form'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'char code'=>'char k' in class 'com.volmit.iris.util.C'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.Map BY_CHAR'=>'java.util.Map c' in class 'com.volmit.iris.util.C'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.lang.String toString'=>'java.lang.String e' in class 'com.volmit.iris.util.C'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int intCode'=>'int h' in class 'com.volmit.iris.util.C'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean isFormat'=>'boolean j' in class 'com.volmit.iris.util.C'. Given that the prefix 'is' is common, only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.util.Map dyeChatMap'=>'java.util.Map g' in class 'com.volmit.iris.util.C'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.C[] COLORS'=>'com.volmit.iris.util.C[] a' in class 'com.volmit.iris.util.C'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.util.Map dyeHexMap'=>'java.util.Map f' in class 'com.volmit.iris.util.C'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.C[] $VALUES'=>'com.volmit.iris.util.C[] d' in class 'com.volmit.iris.util.C'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.Map BY_ID'=>'java.util.Map b' in class 'com.volmit.iris.util.C'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.util.Map chatHexMap'=>'java.util.Map i' in class 'com.volmit.iris.util.C'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap types'=>'com.volmit.iris.util.KMap c' in class 'com.volmit.iris.util.B'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap solid'=>'com.volmit.iris.util.KMap e' in class 'com.volmit.iris.util.B'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap bdc'=>'com.volmit.iris.util.KMap f' in class 'com.volmit.iris.util.B'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList nulls'=>'com.volmit.iris.util.KList d' in class 'com.volmit.iris.util.B'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.block.data.BlockData AIR'=>'org.bukkit.block.data.BlockData a' in class 'com.volmit.iris.util.B'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.WhiteNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int tid'=>'int e' in class 'com.volmit.iris.util.J'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean started'=>'boolean c' in class 'com.volmit.iris.util.J'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.concurrent.ExecutorService e'=>'java.util.concurrent.ExecutorService a' in class 'com.volmit.iris.util.J'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.IrisLock lock'=>'com.volmit.iris.util.IrisLock b' in class 'com.volmit.iris.gen.atomics.MasterLock'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap locks'=>'com.volmit.iris.util.KMap a' in class 'com.volmit.iris.gen.atomics.MasterLock'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList queue'=>'com.volmit.iris.util.KList c' in class 'com.volmit.iris.util.IrisPostBlockFilter'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int phase'=>'int a' in class 'com.volmit.iris.util.IrisPostBlockFilter'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String key'=>'java.lang.String b' in class 'com.volmit.iris.util.IrisPostBlockFilter'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList observers'=>'com.volmit.iris.util.KList b' in class 'com.volmit.iris.util.O'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.Object t'=>'java.lang.Object a' in class 'com.volmit.iris.util.O'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'byte[] value'=>'byte[] b' in class 'com.volmit.iris.util.ByteArrayTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'float[] sin'=>'float[] a' in class 'com.volmit.iris.util.M'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.CellGenerator cell'=>'com.volmit.iris.noise.CellGenerator a' in class 'com.volmit.iris.gen.layer.GenLayerCarve'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.IrisLock lock'=>'com.volmit.iris.util.IrisLock u' in class 'com.volmit.iris.gen.ParallaxChunkGenerator'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.layer.GenLayerUpdate glUpdate'=>'com.volmit.iris.gen.layer.GenLayerUpdate w' in class 'com.volmit.iris.gen.ParallaxChunkGenerator'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.MasterLock masterLock'=>'com.volmit.iris.gen.atomics.MasterLock t' in class 'com.volmit.iris.gen.ParallaxChunkGenerator'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.IrisLock lockq'=>'com.volmit.iris.util.IrisLock s' in class 'com.volmit.iris.gen.ParallaxChunkGenerator'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.IrisLock flock'=>'com.volmit.iris.util.IrisLock v' in class 'com.volmit.iris.gen.ParallaxChunkGenerator'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'short cacheID'=>'short r' in class 'com.volmit.iris.gen.ParallaxChunkGenerator'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.layer.GenLayerText glText'=>'com.volmit.iris.gen.layer.GenLayerText x' in class 'com.volmit.iris.gen.ParallaxChunkGenerator'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.FractalBillowSimplexNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.Object o'=>'java.lang.Object a' in class 'com.volmit.iris.util.V'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean suppress'=>'boolean b' in class 'com.volmit.iris.util.V'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean local'=>'boolean c' in class 'com.volmit.iris.util.V'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.Element element'=>'com.volmit.iris.util.Element a' in class 'com.volmit.iris.util.UIStaticDecorator'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.TaskExecutor$TaskState state'=>'com.volmit.iris.util.TaskExecutor$TaskState b' in class 'com.volmit.iris.util.TaskExecutor$AssignedTask'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.NastyRunnable task'=>'com.volmit.iris.util.NastyRunnable a' in class 'com.volmit.iris.util.TaskExecutor$AssignedTask'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache cng'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisGeneratorStyle'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.IrisLock time'=>'com.volmit.iris.util.IrisLock e' in class 'com.volmit.iris.gen.atomics.AtomicCache'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.IrisLock write'=>'com.volmit.iris.util.IrisLock h' in class 'com.volmit.iris.gen.atomics.AtomicCache'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int b'=>'int c' in class 'com.volmit.iris.gen.atomics.AtomicCache'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long a'=>'long g' in class 'com.volmit.iris.gen.atomics.AtomicCache'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.IrisLock check'=>'com.volmit.iris.util.IrisLock f' in class 'com.volmit.iris.gen.atomics.AtomicCache'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.Object t'=>'java.lang.Object d' in class 'com.volmit.iris.gen.atomics.AtomicCache'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisBiome[] height'=>'com.volmit.iris.object.IrisBiome[] a' in class 'com.volmit.iris.util.BiomeMap'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double lastSum'=>'double d' in class 'com.volmit.iris.util.Average'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double average'=>'double a' in class 'com.volmit.iris.util.Average'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean dirty'=>'boolean c' in class 'com.volmit.iris.util.Average'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean brandNew'=>'boolean b' in class 'com.volmit.iris.util.Average'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int y'=>'int c' in class 'com.volmit.iris.util.BlockPosition'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int x'=>'int b' in class 'com.volmit.iris.util.BlockPosition'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int z'=>'int a' in class 'com.volmit.iris.util.BlockPosition'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache rad'=>'com.volmit.iris.gen.atomics.AtomicCache i' in class 'com.volmit.iris.object.IrisDimension'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache rockData'=>'com.volmit.iris.gen.atomics.AtomicCache d' in class 'com.volmit.iris.object.IrisDimension'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache sinr'=>'com.volmit.iris.gen.atomics.AtomicCache l' in class 'com.volmit.iris.object.IrisDimension'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache fluidData'=>'com.volmit.iris.gen.atomics.AtomicCache n' in class 'com.volmit.iris.object.IrisDimension'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache cosr'=>'com.volmit.iris.gen.atomics.AtomicCache e' in class 'com.volmit.iris.object.IrisDimension'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'byte value'=>'byte b' in class 'com.volmit.iris.util.ByteTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache blockData'=>'com.volmit.iris.gen.atomics.AtomicCache b' in class 'com.volmit.iris.object.IrisBiomeDecorator'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap b'=>'com.volmit.iris.util.KMap z' in class 'com.volmit.iris.gen.IrisChunkGenerator'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisBiome hb'=>'com.volmit.iris.object.IrisBiome A' in class 'com.volmit.iris.gen.IrisChunkGenerator'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisRegion hr'=>'com.volmit.iris.object.IrisRegion B' in class 'com.volmit.iris.gen.IrisChunkGenerator'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int h'=>'int o' in class 'com.volmit.iris.util.StructureTemplate'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.io.File folder'=>'java.io.File t' in class 'com.volmit.iris.util.StructureTemplate'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.block.data.BlockData STONE'=>'org.bukkit.block.data.BlockData j' in class 'com.volmit.iris.util.StructureTemplate'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.World world'=>'org.bukkit.World g' in class 'com.volmit.iris.util.StructureTemplate'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean use3d'=>'boolean q' in class 'com.volmit.iris.util.StructureTemplate'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.CNG variants'=>'com.volmit.iris.noise.CNG l' in class 'com.volmit.iris.util.StructureTemplate'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap updates'=>'com.volmit.iris.util.KMap u' in class 'com.volmit.iris.util.StructureTemplate'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ChronoLatch u'=>'com.volmit.iris.util.ChronoLatch n' in class 'com.volmit.iris.util.StructureTemplate'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.block.data.BlockData RED'=>'org.bukkit.block.data.BlockData h' in class 'com.volmit.iris.util.StructureTemplate'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.Location center'=>'org.bukkit.Location c' in class 'com.volmit.iris.util.StructureTemplate'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.block.data.BlockData GREEN'=>'org.bukkit.block.data.BlockData p' in class 'com.volmit.iris.util.StructureTemplate'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisStructure structure'=>'com.volmit.iris.object.IrisStructure i' in class 'com.volmit.iris.util.StructureTemplate'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RNG rng'=>'com.volmit.iris.util.RNG d' in class 'com.volmit.iris.util.StructureTemplate'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int task'=>'int b' in class 'com.volmit.iris.util.StructureTemplate'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ChronoLatch gLatch'=>'com.volmit.iris.util.ChronoLatch r' in class 'com.volmit.iris.util.StructureTemplate'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ChronoLatch dirtyLatch'=>'com.volmit.iris.util.ChronoLatch k' in class 'com.volmit.iris.util.StructureTemplate'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int size'=>'int a' in class 'com.volmit.iris.util.StructureTemplate'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.entity.Player worker'=>'org.bukkit.entity.Player e' in class 'com.volmit.iris.util.StructureTemplate'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int w'=>'int s' in class 'com.volmit.iris.util.StructureTemplate'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.Location focus'=>'org.bukkit.Location f' in class 'com.volmit.iris.util.StructureTemplate'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RNG rng'=>'com.volmit.iris.util.RNG d' in class 'com.volmit.iris.gen.post.PostSlabber'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int rcz'=>'int g' in class 'com.volmit.iris.util.PregenJob'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.PrecisionStopwatch s'=>'com.volmit.iris.util.PrecisionStopwatch c' in class 'com.volmit.iris.util.PregenJob'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.World world'=>'org.bukkit.World f' in class 'com.volmit.iris.util.PregenJob'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.Runnable onDone'=>'java.lang.Runnable i' in class 'com.volmit.iris.util.PregenJob'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.MortarSender sender'=>'com.volmit.iris.util.MortarSender e' in class 'com.volmit.iris.util.PregenJob'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int rcx'=>'int j' in class 'com.volmit.iris.util.PregenJob'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean completed'=>'boolean b' in class 'com.volmit.iris.util.PregenJob'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int genned'=>'int d' in class 'com.volmit.iris.util.PregenJob'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int mcaZ'=>'int a' in class 'com.volmit.iris.util.PregenJob'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ChronoLatch cl'=>'com.volmit.iris.util.ChronoLatch h' in class 'com.volmit.iris.util.PregenJob'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int mcaX'=>'int k' in class 'com.volmit.iris.util.PregenJob'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int total'=>'int l' in class 'com.volmit.iris.util.PregenJob'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int size'=>'int m' in class 'com.volmit.iris.util.PregenJob'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache generator'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisNoiseGenerator'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'char[] hexArray'=>'char[] a' in class 'com.volmit.iris.util.IO'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.CNGFactory f'=>'com.volmit.iris.noise.CNGFactory b' in class 'com.volmit.iris.object.NoiseStyle'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.NoiseStyle[] $VALUES'=>'com.volmit.iris.object.NoiseStyle[] a' in class 'com.volmit.iris.object.NoiseStyle'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int x'=>'int a' in class 'com.volmit.iris.util.ChunkPosition'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int z'=>'int b' in class 'com.volmit.iris.util.ChunkPosition'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap positions'=>'com.volmit.iris.util.KMap w' in class 'com.volmit.iris.gui.IrisVision'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.O m'=>'com.volmit.iris.util.O s' in class 'com.volmit.iris.gui.IrisVision'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int tid'=>'int o' in class 'com.volmit.iris.gui.IrisVision'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double tfps'=>'double f' in class 'com.volmit.iris.gui.IrisVision'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double lx'=>'double l' in class 'com.volmit.iris.gui.IrisVision'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double lz'=>'double k' in class 'com.volmit.iris.gui.IrisVision'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double scale'=>'double c' in class 'com.volmit.iris.gui.IrisVision'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gui.IrisRenderer renderer'=>'com.volmit.iris.gui.IrisRenderer m' in class 'com.volmit.iris.gui.IrisVision'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String a'=>'java.lang.String j' in class 'com.volmit.iris.gui.IrisVision'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'short lid'=>'short u' in class 'com.volmit.iris.gui.IrisVision'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double ozp'=>'double p' in class 'com.volmit.iris.gui.IrisVision'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int h'=>'int a' in class 'com.volmit.iris.gui.IrisVision'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double oxp'=>'double i' in class 'com.volmit.iris.gui.IrisVision'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RollingSequence rs'=>'com.volmit.iris.util.RollingSequence x' in class 'com.volmit.iris.gui.IrisVision'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double ox'=>'double d' in class 'com.volmit.iris.gui.IrisVision'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double oz'=>'double r' in class 'com.volmit.iris.gui.IrisVision'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int posX'=>'int q' in class 'com.volmit.iris.gui.IrisVision'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double mscale'=>'double h' in class 'com.volmit.iris.gui.IrisVision'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.concurrent.ExecutorService eh'=>'java.util.concurrent.ExecutorService e' in class 'com.volmit.iris.gui.IrisVision'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int posZ'=>'int b' in class 'com.volmit.iris.gui.IrisVision'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KSet working'=>'com.volmit.iris.util.KSet g' in class 'com.volmit.iris.gui.IrisVision'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.concurrent.ExecutorService e'=>'java.util.concurrent.ExecutorService v' in class 'com.volmit.iris.gui.IrisVision'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int w'=>'int n' in class 'com.volmit.iris.gui.IrisVision'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.block.data.BlockData AIR'=>'org.bukkit.block.data.BlockData d' in class 'com.volmit.iris.gen.post.PostFloatingNibDeleter'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.Envelope[] $VALUES'=>'com.volmit.iris.object.Envelope[] a' in class 'com.volmit.iris.object.Envelope'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$CellularDistanceFunction[] $VALUES'=>'com.volmit.iris.noise.FastNoise$CellularDistanceFunction[] a' in class 'com.volmit.iris.noise.FastNoise$CellularDistanceFunction'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String[] a'=>'java.lang.String[] b' in class 'com.volmit.iris.command.PermissionIris'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache debug'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.gen.layer.GenLayerText'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache sideACache'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisBiomeMutation'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache sideBCache'=>'com.volmit.iris.gen.atomics.AtomicCache b' in class 'com.volmit.iris.object.IrisBiomeMutation'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String mem'=>'java.lang.String a' in class 'com.volmit.iris.IrisBoardManager'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ChronoLatch cl'=>'com.volmit.iris.util.ChronoLatch b' in class 'com.volmit.iris.IrisBoardManager'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.DecorationPart[] $VALUES'=>'com.volmit.iris.object.DecorationPart[] a' in class 'com.volmit.iris.object.DecorationPart'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList deposits'=>'com.volmit.iris.util.KList f' in class 'com.volmit.iris.object.IrisRegion'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache cacheRidge'=>'com.volmit.iris.gen.atomics.AtomicCache i' in class 'com.volmit.iris.object.IrisRegion'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache cacheSpot'=>'com.volmit.iris.gen.atomics.AtomicCache h' in class 'com.volmit.iris.object.IrisRegion'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache blockData'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisBiomePaletteLayer'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.World w'=>'org.bukkit.World g' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int y'=>'int c' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int x'=>'int b' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int baseZ'=>'int j' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int baseY'=>'int i' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int z'=>'int f' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int sizeZ'=>'int h' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int sizeY'=>'int e' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int sizeX'=>'int a' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int baseX'=>'int d' in class 'com.volmit.iris.util.Cuboid$CuboidIterator'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ChronoLatch useFlip'=>'com.volmit.iris.util.ChronoLatch b' in class 'com.volmit.iris.util.ObjectResourceLoader'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap useCache'=>'com.volmit.iris.util.KMap a' in class 'com.volmit.iris.util.ObjectResourceLoader'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.StructureTileFace[] $VALUES'=>'com.volmit.iris.object.StructureTileFace[] a' in class 'com.volmit.iris.object.StructureTileFace'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache fontData'=>'com.volmit.iris.gen.atomics.AtomicCache c' in class 'com.volmit.iris.object.IrisTextRenderer'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache maxLength'=>'com.volmit.iris.gen.atomics.AtomicCache b' in class 'com.volmit.iris.object.IrisTextRenderer'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache objects'=>'com.volmit.iris.gen.atomics.AtomicCache d' in class 'com.volmit.iris.object.IrisTextRenderer'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.slf4j.Logger log'=>'org.slf4j.Logger a' in class 'org.zeroturnaround.zip.ZipUtil'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String a'=>'java.lang.String b' in class 'org.slf4j.LoggerFactory'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.Map map'=>'java.util.Map a' in class 'com.volmit.iris.util.JSONObject'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.FractalBillowPerlinNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache gen'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisBiomeGeneratorLink'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap structures'=>'com.volmit.iris.util.KMap b' in class 'com.volmit.iris.gen.atomics.AtomicSliverMap'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicSliver[] slivers'=>'com.volmit.iris.gen.atomics.AtomicSliver[] a' in class 'com.volmit.iris.gen.atomics.AtomicSliverMap'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.io.File outputDir'=>'java.io.File a' in class 'org.zeroturnaround.zip.ZipUtil$Unpacker'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.zeroturnaround.zip.NameMapper mapper'=>'org.zeroturnaround.zip.NameMapper b' in class 'org.zeroturnaround.zip.ZipUtil$Unpacker'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double value'=>'double b' in class 'com.volmit.iris.util.DoubleTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'double distance'=>'double b' in class 'com.volmit.iris.util.BiomeResult'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisBiome biome'=>'com.volmit.iris.object.IrisBiome a' in class 'com.volmit.iris.util.BiomeResult'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.InferredType[] $VALUES'=>'com.volmit.iris.object.InferredType[] a' in class 'com.volmit.iris.object.InferredType'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.TaskExecutor$TaskState[] $VALUES'=>'com.volmit.iris.util.TaskExecutor$TaskState[] a' in class 'com.volmit.iris.util.TaskExecutor$TaskState'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache tt'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisLootReference'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long value'=>'long b' in class 'org.zeroturnaround.zip.extra.ZipLong'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.DimensionChunkGenerator iris'=>'com.volmit.iris.gen.DimensionChunkGenerator a' in class 'com.volmit.iris.gen.layer.GenLayerBiome'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache config'=>'com.volmit.iris.gen.atomics.AtomicCache b' in class 'com.volmit.iris.object.IrisStructurePlacement'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache chanceCell'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisStructurePlacement'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache structure'=>'com.volmit.iris.gen.atomics.AtomicCache c' in class 'com.volmit.iris.object.IrisStructurePlacement'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.FontStyle[] $VALUES'=>'com.volmit.iris.object.FontStyle[] a' in class 'com.volmit.iris.object.FontStyle'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.Map value'=>'java.util.Map b' in class 'com.volmit.iris.util.CompoundTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.List value'=>'java.util.List b' in class 'com.volmit.iris.util.ListTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.Class type'=>'java.lang.Class c' in class 'com.volmit.iris.util.ListTag'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'long startNano'=>'long d' in class 'com.volmit.iris.util.PrecisionStopwatch'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long nanos'=>'long f' in class 'com.volmit.iris.util.PrecisionStopwatch'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean profiling'=>'boolean c' in class 'com.volmit.iris.util.PrecisionStopwatch'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long millis'=>'long b' in class 'com.volmit.iris.util.PrecisionStopwatch'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double time'=>'double e' in class 'com.volmit.iris.util.PrecisionStopwatch'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long value'=>'long b' in class 'com.volmit.iris.util.LongTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'org.zeroturnaround.zip.extra.ZipShort headerId'=>'org.zeroturnaround.zip.extra.ZipShort b' in class 'org.zeroturnaround.zip.extra.UnrecognizedExtraField'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'byte[] localData'=>'byte[] a' in class 'org.zeroturnaround.zip.extra.UnrecognizedExtraField'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int value'=>'int b' in class 'com.volmit.iris.util.IntTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.FractalFBMSimplexNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.scoreboard.Team team'=>'org.bukkit.scoreboard.Team c' in class 'com.volmit.iris.util.Board'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean ready'=>'boolean g' in class 'com.volmit.iris.util.Board'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'org.bukkit.scoreboard.Objective objective'=>'org.bukkit.scoreboard.Objective b' in class 'com.volmit.iris.util.Board'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.entity.Player player'=>'org.bukkit.entity.Player d' in class 'com.volmit.iris.util.Board'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisWhat what'=>'com.volmit.iris.command.CommandIrisWhat h' in class 'com.volmit.iris.command.CommandIris'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStructure structure'=>'com.volmit.iris.command.CommandIrisStructure g' in class 'com.volmit.iris.command.CommandIris'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObject object'=>'com.volmit.iris.command.CommandIrisObject k' in class 'com.volmit.iris.command.CommandIris'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisCreate create'=>'com.volmit.iris.command.CommandIrisCreate j' in class 'com.volmit.iris.command.CommandIris'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisStudio studio'=>'com.volmit.iris.command.CommandIrisStudio i' in class 'com.volmit.iris.command.CommandIris'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int[] value'=>'int[] b' in class 'com.volmit.iris.util.IntArrayTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.IrisLock lock'=>'com.volmit.iris.util.IrisLock g' in class 'com.volmit.iris.gen.atomics.AtomicSliver'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean modified'=>'boolean j' in class 'com.volmit.iris.gen.atomics.AtomicSliver'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap truebiome'=>'com.volmit.iris.util.KMap a' in class 'com.volmit.iris.gen.atomics.AtomicSliver'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long last'=>'long i' in class 'com.volmit.iris.gen.atomics.AtomicSliver'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap block'=>'com.volmit.iris.util.KMap f' in class 'com.volmit.iris.gen.atomics.AtomicSliver'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int x'=>'int b' in class 'com.volmit.iris.gen.atomics.AtomicSliver'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int z'=>'int c' in class 'com.volmit.iris.gen.atomics.AtomicSliver'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap biome'=>'com.volmit.iris.util.KMap d' in class 'com.volmit.iris.gen.atomics.AtomicSliver'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache replaceGen'=>'com.volmit.iris.gen.atomics.AtomicCache b' in class 'com.volmit.iris.object.IrisObjectReplace'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache findData'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisObjectReplace'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean exists'=>'boolean c' in class 'com.volmit.iris.util.FileWatcher'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'long size'=>'long b' in class 'com.volmit.iris.util.FileWatcher'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ChronoLatch latch'=>'com.volmit.iris.util.ChronoLatch b' in class 'com.volmit.iris.IrisHotloadManager'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean busy'=>'boolean c' in class 'com.volmit.iris.IrisHotloadManager'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.FolderWatcher w'=>'com.volmit.iris.util.FolderWatcher a' in class 'com.volmit.iris.IrisHotloadManager'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise b' in class 'com.volmit.iris.noise.PerlinNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int octaves'=>'int a' in class 'com.volmit.iris.noise.PerlinNoise'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String a'=>'java.lang.String b' in class 'org.slf4j.helpers.MarkerIgnoringBase'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache data'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisBlockDrops'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList blocks'=>'com.volmit.iris.util.KList b' in class 'com.volmit.iris.object.IrisBlockDrops'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.ParallaxChunkGenerator gen'=>'com.volmit.iris.gen.ParallaxChunkGenerator d' in class 'com.volmit.iris.gen.layer.GenLayerUpdate'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RNG rng'=>'com.volmit.iris.util.RNG c' in class 'com.volmit.iris.gen.layer.GenLayerUpdate'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean a'=>'boolean b' in class 'com.volmit.iris.gen.layer.GenLayerUpdate'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache latch'=>'com.volmit.iris.gen.atomics.AtomicCache b' in class 'com.volmit.iris.object.IrisEffect'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache pt'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisEffect'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache objects'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisDepositGenerator'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache blockData'=>'com.volmit.iris.gen.atomics.AtomicCache b' in class 'com.volmit.iris.object.IrisDepositGenerator'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache blockData'=>'com.volmit.iris.gen.atomics.AtomicCache c' in class 'com.volmit.iris.object.IrisMaterialPalette'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.layer.GenLayerCave glCave'=>'com.volmit.iris.gen.layer.GenLayerCave n' in class 'com.volmit.iris.gen.TerrainChunkGenerator'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.layer.GenLayerCarve glCarve'=>'com.volmit.iris.gen.layer.GenLayerCarve m' in class 'com.volmit.iris.gen.TerrainChunkGenerator'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RNG rockRandom'=>'com.volmit.iris.util.RNG k' in class 'com.volmit.iris.gen.TerrainChunkGenerator'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap generators'=>'com.volmit.iris.util.KMap l' in class 'com.volmit.iris.gen.TerrainChunkGenerator'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RollingSequence parallax'=>'com.volmit.iris.util.RollingSequence b' in class 'com.volmit.iris.IrisMetrics'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RollingSequence update'=>'com.volmit.iris.util.RollingSequence f' in class 'com.volmit.iris.IrisMetrics'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RollingSequence total'=>'com.volmit.iris.util.RollingSequence a' in class 'com.volmit.iris.IrisMetrics'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RollingSequence post'=>'com.volmit.iris.util.RollingSequence e' in class 'com.volmit.iris.IrisMetrics'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RollingSequence perSecond'=>'com.volmit.iris.util.RollingSequence c' in class 'com.volmit.iris.IrisMetrics'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.RollingSequence terrain'=>'com.volmit.iris.util.RollingSequence d' in class 'com.volmit.iris.IrisMetrics'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$Interp[] $VALUES'=>'com.volmit.iris.noise.FastNoise$Interp[] a' in class 'com.volmit.iris.noise.FastNoise$Interp'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.InterpolationMethod[] $VALUES'=>'com.volmit.iris.object.InterpolationMethod[] a' in class 'com.volmit.iris.object.InterpolationMethod'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int a'=>'int b' in class 'org.zeroturnaround.zip.extra.ZipShort'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int value'=>'int a' in class 'org.zeroturnaround.zip.extra.ZipShort'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.NoiseFactory f'=>'com.volmit.iris.noise.NoiseFactory a' in class 'com.volmit.iris.noise.NoiseType'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.NoiseType[] $VALUES'=>'com.volmit.iris.noise.NoiseType[] b' in class 'com.volmit.iris.noise.NoiseType'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$CellularReturnType[] $VALUES'=>'com.volmit.iris.noise.FastNoise$CellularReturnType[] a' in class 'com.volmit.iris.noise.FastNoise$CellularReturnType'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache config'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisTextPlacement'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gui.Renderer renderer'=>'com.volmit.iris.gui.Renderer a' in class 'com.volmit.iris.gui.IrisRenderer'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ElementEvent[] $VALUES'=>'com.volmit.iris.util.ElementEvent[] a' in class 'com.volmit.iris.util.ElementEvent'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.Object k'=>'java.lang.Object b' in class 'com.volmit.iris.util.KeyPair'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.Object v'=>'java.lang.Object a' in class 'com.volmit.iris.util.KeyPair'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.LootMode[] $VALUES'=>'com.volmit.iris.object.LootMode[] a' in class 'com.volmit.iris.object.LootMode'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache maxFaces'=>'com.volmit.iris.gen.atomics.AtomicCache b' in class 'com.volmit.iris.object.IrisStructureTile'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache minFaces'=>'com.volmit.iris.gen.atomics.AtomicCache c' in class 'com.volmit.iris.object.IrisStructureTile'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.IrisLock lock'=>'com.volmit.iris.util.IrisLock i' in class 'com.volmit.iris.Iris'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean b'=>'boolean h' in class 'com.volmit.iris.Iris'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int count'=>'int l' in class 'com.volmit.iris.util.UIElement'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.Callback eLeft'=>'com.volmit.iris.util.Callback h' in class 'com.volmit.iris.util.UIElement'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.Callback eRight'=>'com.volmit.iris.util.Callback i' in class 'com.volmit.iris.util.UIElement'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String name'=>'java.lang.String m' in class 'com.volmit.iris.util.UIElement'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String id'=>'java.lang.String g' in class 'com.volmit.iris.util.UIElement'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean enchanted'=>'boolean b' in class 'com.volmit.iris.util.UIElement'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.MaterialBlock material'=>'com.volmit.iris.util.MaterialBlock d' in class 'com.volmit.iris.util.UIElement'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'double progress'=>'double f' in class 'com.volmit.iris.util.UIElement'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList lore'=>'com.volmit.iris.util.KList j' in class 'com.volmit.iris.util.UIElement'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.Callback eShiftLeft'=>'com.volmit.iris.util.Callback k' in class 'com.volmit.iris.util.UIElement'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.Byte data'=>'java.lang.Byte a' in class 'com.volmit.iris.util.MaterialBlock'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'org.bukkit.Material material'=>'org.bukkit.Material b' in class 'com.volmit.iris.util.MaterialBlock'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache findData'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisCompatabilityFilter'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.io.File loadFile'=>'java.io.File b' in class 'com.volmit.iris.object.IrisRegistrant'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String loadKey'=>'java.lang.String a' in class 'com.volmit.iris.object.IrisRegistrant'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean a'=>'boolean c' in class 'com.volmit.iris.object.IrisRegistrant'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int a'=>'int b' in class 'com.volmit.iris.activation.IrisActivation2'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisStructureTile tile'=>'com.volmit.iris.object.IrisStructureTile c' in class 'com.volmit.iris.object.TileResult'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisStructure structure'=>'com.volmit.iris.object.IrisStructure a' in class 'com.volmit.iris.object.TileResult'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.IrisObjectPlacement placement'=>'com.volmit.iris.object.IrisObjectPlacement b' in class 'com.volmit.iris.object.TileResult'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String prefix'=>'java.lang.String b' in class 'com.volmit.iris.util.BoardEntry'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String suffix'=>'java.lang.String a' in class 'com.volmit.iris.util.BoardEntry'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String node'=>'java.lang.String f' in class 'com.volmit.iris.util.MortarCommand'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList nodes'=>'com.volmit.iris.util.KList a' in class 'com.volmit.iris.util.MortarCommand'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.lang.String category'=>'java.lang.String c' in class 'com.volmit.iris.util.MortarCommand'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KList children'=>'com.volmit.iris.util.KList d' in class 'com.volmit.iris.util.MortarCommand'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise$NoiseType[] $VALUES'=>'com.volmit.iris.noise.FastNoise$NoiseType[] a' in class 'com.volmit.iris.noise.FastNoise$NoiseType'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String tag'=>'java.lang.String c' in class 'com.volmit.iris.util.VirtualCommand'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ICommand command'=>'com.volmit.iris.util.ICommand b' in class 'com.volmit.iris.util.VirtualCommand'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap children'=>'com.volmit.iris.util.KMap a' in class 'com.volmit.iris.util.VirtualCommand'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean dirFlag'=>'boolean c' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'int PERM_MASK'=>'int m' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'org.zeroturnaround.zip.extra.ZipShort HEADER_ID'=>'org.zeroturnaround.zip.extra.ZipShort h' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'int DIR_FLAG'=>'int l' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int gid'=>'int k' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.zip.CRC32 crc'=>'java.util.zip.CRC32 j' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int uid'=>'int f' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String link'=>'java.lang.String b' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int mode'=>'int a' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'int FILE_FLAG'=>'int i' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'int LINK_FLAG'=>'int g' in class 'org.zeroturnaround.zip.extra.AsiExtraField'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.Throwable cause'=>'java.lang.Throwable a' in class 'com.volmit.iris.util.JSONException'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise fd'=>'com.volmit.iris.noise.FastNoise e' in class 'com.volmit.iris.noise.CellGenerator'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.CNG cng'=>'com.volmit.iris.noise.CNG d' in class 'com.volmit.iris.noise.CellGenerator'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'double cellScale'=>'double a' in class 'com.volmit.iris.noise.CellGenerator'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise fn'=>'com.volmit.iris.noise.FastNoise c' in class 'com.volmit.iris.noise.CellGenerator'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'double shuffle'=>'double b' in class 'com.volmit.iris.noise.CellGenerator'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ScoreDirection[] $VALUES'=>'com.volmit.iris.util.ScoreDirection[] a' in class 'com.volmit.iris.util.ScoreDirection'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache chance'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisLoot'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.FractalRigidMultiSimplexNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.ObjectPlaceMode[] $VALUES'=>'com.volmit.iris.object.ObjectPlaceMode[] a' in class 'com.volmit.iris.object.ObjectPlaceMode'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int a'=>'int b' in class 'org.zeroturnaround.zip.commons.FileUtilsV2_2'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'boolean disabled'=>'boolean c' in class 'com.volmit.iris.util.IrisLock'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String name'=>'java.lang.String a' in class 'com.volmit.iris.util.IrisLock'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.concurrent.locks.ReentrantLock lock'=>'java.util.concurrent.locks.ReentrantLock b' in class 'com.volmit.iris.util.IrisLock'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache spot'=>'com.volmit.iris.gen.atomics.AtomicCache a' in class 'com.volmit.iris.object.IrisRegionSpot'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache maxHeight'=>'com.volmit.iris.gen.atomics.AtomicCache g' in class 'com.volmit.iris.object.IrisBiome'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.atomics.AtomicCache cacheColor'=>'com.volmit.iris.gen.atomics.AtomicCache e' in class 'com.volmit.iris.object.IrisBiome'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.CellHeightNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.VascularNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'float value'=>'float b' in class 'com.volmit.iris.util.FloatTag'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectSave save'=>'com.volmit.iris.command.CommandIrisObjectSave j' in class 'com.volmit.iris.command.CommandIrisObject'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectP2 p2'=>'com.volmit.iris.command.CommandIrisObjectP2 n' in class 'com.volmit.iris.command.CommandIrisObject'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectPaste paste'=>'com.volmit.iris.command.CommandIrisObjectPaste i' in class 'com.volmit.iris.command.CommandIrisObject'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectP1 p1'=>'com.volmit.iris.command.CommandIrisObjectP1 l' in class 'com.volmit.iris.command.CommandIrisObject'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectXPY xpy'=>'com.volmit.iris.command.CommandIrisObjectXPY o' in class 'com.volmit.iris.command.CommandIrisObject'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectXAY xay'=>'com.volmit.iris.command.CommandIrisObjectXAY k' in class 'com.volmit.iris.command.CommandIrisObject'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectWand wand'=>'com.volmit.iris.command.CommandIrisObjectWand g' in class 'com.volmit.iris.command.CommandIrisObject'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectExpand expand'=>'com.volmit.iris.command.CommandIrisObjectExpand p' in class 'com.volmit.iris.command.CommandIrisObject'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectShift shift'=>'com.volmit.iris.command.CommandIrisObjectShift h' in class 'com.volmit.iris.command.CommandIrisObject'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.command.CommandIrisObjectContract contract'=>'com.volmit.iris.command.CommandIrisObjectContract m' in class 'com.volmit.iris.command.CommandIrisObject'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int xc'=>'int c' in class 'com.volmit.iris.util.GroupedExecutor'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap mirror'=>'com.volmit.iris.util.KMap b' in class 'com.volmit.iris.util.GroupedExecutor'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.concurrent.ExecutorService service'=>'java.util.concurrent.ExecutorService a' in class 'com.volmit.iris.util.GroupedExecutor'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.block.data.BlockData WATER'=>'org.bukkit.block.data.BlockData d' in class 'com.volmit.iris.gen.post.PostWaterlogger'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.util.concurrent.locks.ReentrantLock lock'=>'java.util.concurrent.locks.ReentrantLock b' in class 'com.volmit.iris.ProjectManager'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.TaskExecutor tx'=>'com.volmit.iris.util.TaskExecutor c' in class 'com.volmit.iris.ProjectManager'. Only 2 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.Direction[] $VALUES'=>'com.volmit.iris.util.Direction[] e' in class 'com.volmit.iris.util.Direction'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int y'=>'int f' in class 'com.volmit.iris.util.Direction'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap permute'=>'com.volmit.iris.util.KMap c' in class 'com.volmit.iris.util.Direction'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int x'=>'int b' in class 'com.volmit.iris.util.Direction'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.Cuboid$CuboidDirection f'=>'com.volmit.iris.util.Cuboid$CuboidDirection d' in class 'com.volmit.iris.util.Direction'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int z'=>'int a' in class 'com.volmit.iris.util.Direction'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.CNG generator'=>'com.volmit.iris.noise.CNG b' in class 'com.volmit.iris.gen.layer.BiomeDataProvider'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.InferredType type'=>'com.volmit.iris.object.InferredType a' in class 'com.volmit.iris.gen.layer.BiomeDataProvider'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.gen.layer.GenLayerBiome layer'=>'com.volmit.iris.gen.layer.GenLayerBiome c' in class 'com.volmit.iris.gen.layer.BiomeDataProvider'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.ResourceLoader lootLoader'=>'com.volmit.iris.util.ResourceLoader b' in class 'com.volmit.iris.IrisDataManager'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'java.io.File dataFolder'=>'java.io.File g' in class 'com.volmit.iris.IrisDataManager'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean prod'=>'boolean d' in class 'com.volmit.iris.IrisDataManager'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.io.File packs'=>'java.io.File i' in class 'com.volmit.iris.IrisDataManager'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.World world'=>'org.bukkit.World a' in class 'com.volmit.iris.gen.atomics.AtomicRegionData'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.Tag[] tag'=>'com.volmit.iris.util.Tag[] b' in class 'com.volmit.iris.gen.atomics.AtomicRegionData'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.entity.Player viewer'=>'org.bukkit.entity.Player d' in class 'com.volmit.iris.util.UIWindow'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.WindowResolution resolution'=>'com.volmit.iris.util.WindowResolution h' in class 'com.volmit.iris.util.UIWindow'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'int clickcheck'=>'int l' in class 'com.volmit.iris.util.UIWindow'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.WindowDecorator decorator'=>'com.volmit.iris.util.WindowDecorator m' in class 'com.volmit.iris.util.UIWindow'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'org.bukkit.inventory.Inventory inventory'=>'org.bukkit.inventory.Inventory j' in class 'com.volmit.iris.util.UIWindow'. Only 9 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.Callback eClose'=>'com.volmit.iris.util.Callback g' in class 'com.volmit.iris.util.UIWindow'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'int highestRow'=>'int f' in class 'com.volmit.iris.util.UIWindow'. Only 10 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'boolean visible'=>'boolean b' in class 'com.volmit.iris.util.UIWindow'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.lang.String title'=>'java.lang.String c' in class 'com.volmit.iris.util.UIWindow'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap elements'=>'com.volmit.iris.util.KMap e' in class 'com.volmit.iris.util.UIWindow'. Only 8 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'java.io.DataInputStream is'=>'java.io.DataInputStream a' in class 'com.volmit.iris.util.NBTInputStream'. Given that the prefix 'is' is common, only 0 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.object.InventorySlotType[] $VALUES'=>'com.volmit.iris.object.InventorySlotType[] a' in class 'com.volmit.iris.object.InventorySlotType'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.noise.FastNoise n'=>'com.volmit.iris.noise.FastNoise a' in class 'com.volmit.iris.noise.SimplexNoise'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int octaves'=>'int b' in class 'com.volmit.iris.noise.SimplexNoise'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int ceiling'=>'int a' in class 'com.volmit.iris.util.CaveResult'. Only 7 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int floor'=>'int b' in class 'com.volmit.iris.util.CaveResult'. Only 5 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int h'=>'int d' in class 'com.volmit.iris.object.IrisObject'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.util.BlockVector center'=>'org.bukkit.util.BlockVector e' in class 'com.volmit.iris.object.IrisObject'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'com.volmit.iris.util.KMap blocks'=>'com.volmit.iris.util.KMap g' in class 'com.volmit.iris.object.IrisObject'. Only 6 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int d'=>'int h' in class 'com.volmit.iris.object.IrisObject'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.Material SNOW'=>'org.bukkit.Material k' in class 'com.volmit.iris.object.IrisObject'. Only 4 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'org.bukkit.block.data.BlockData AIR'=>'org.bukkit.block.data.BlockData i' in class 'com.volmit.iris.object.IrisObject'. Only 3 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Field mapping 'int w'=>'int f' in class 'com.volmit.iris.object.IrisObject'. Only 1 characters have to be guessed in field name. If field is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.Cuboid$1'=>'com.volmit.iris.util.Cuboid$a'. Only 8 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$5'=>'com.volmit.iris.util.C$r'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$4'=>'com.volmit.iris.util.C$q'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$3'=>'com.volmit.iris.util.C$p'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$2'=>'com.volmit.iris.util.C$l'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$1'=>'com.volmit.iris.util.C$a'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$9'=>'com.volmit.iris.util.C$v'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$8'=>'com.volmit.iris.util.C$u'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$7'=>'com.volmit.iris.util.C$t'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$6'=>'com.volmit.iris.util.C$s'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.UIWindow$1'=>'com.volmit.iris.util.UIWindow$a'. Only 10 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$22'=>'com.volmit.iris.util.C$o'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$20'=>'com.volmit.iris.util.C$m'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$21'=>'com.volmit.iris.util.C$n'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.J$1'=>'com.volmit.iris.util.J$a'. Only 3 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$11'=>'com.volmit.iris.util.C$c'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$12'=>'com.volmit.iris.util.C$d'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$10'=>'com.volmit.iris.util.C$b'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$15'=>'com.volmit.iris.util.C$g'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$16'=>'com.volmit.iris.util.C$h'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$13'=>'com.volmit.iris.util.C$e'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$14'=>'com.volmit.iris.util.C$f'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$19'=>'com.volmit.iris.util.C$k'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$17'=>'com.volmit.iris.util.C$i'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.C$18'=>'com.volmit.iris.util.C$j'. Only 4 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Class mapping 'com.volmit.iris.util.Board$1'=>'com.volmit.iris.util.Board$a'. Only 7 characters have to be guessed in class name. If class is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'setExecutable(java.io.File, boolean, boolean)'=>'b(java.io.File, boolean, boolean)' in class 'org.zeroturnaround.zip.Java6FileApiPermissionsStrategy'. Given that the prefix 'set' is common, only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'setWritable(java.io.File, boolean, boolean)'=>'a(java.io.File, boolean, boolean)' in class 'org.zeroturnaround.zip.Java6FileApiPermissionsStrategy'. Given that the prefix 'set' is common, only 8 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'canExecute(java.io.File)'=>'a(java.io.File)' in class 'org.zeroturnaround.zip.Java6FileApiPermissionsStrategy'. Only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'setReadable(java.io.File, boolean, boolean)'=>'c(java.io.File, boolean, boolean)' in class 'org.zeroturnaround.zip.Java6FileApiPermissionsStrategy'. Given that the prefix 'set' is common, only 8 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'invoke(java.lang.reflect.Method, java.lang.Object, java.lang.Object[])'=>'a(java.lang.reflect.Method, java.lang.Object, java.lang.Object[])' in class 'org.zeroturnaround.zip.ZTZipReflectionUtil'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'isPosix()'=>'a()' in class 'org.zeroturnaround.zip.Java7Nio2ApiPermissionsStrategy'. Given that the prefix 'is' is common, only 5 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'toPath(java.io.File)'=>'a(java.io.File)' in class 'org.zeroturnaround.zip.Java7Nio2ApiPermissionsStrategy'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'addIf(boolean, java.util.Set, java.lang.Object)'=>'a(boolean, java.util.Set, java.lang.Object)' in class 'org.zeroturnaround.zip.Java7Nio2ApiPermissionsStrategy'. Only 5 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'setDirectory(boolean)'=>'f(boolean)' in class 'org.zeroturnaround.zip.ZTFilePermissions'. Given that the prefix 'set' is common, only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'fromFile(java.lang.String, java.io.File)'=>'a(java.lang.String, java.io.File)' in class 'org.zeroturnaround.zip.ZipEntryUtil'. Only 8 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'rethrow(java.io.IOException)'=>'a(java.io.IOException)' in class 'org.zeroturnaround.zip.ZipExceptionUtil'. Only 7 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'addFlag(boolean, int)'=>'a(boolean, int)' in class 'org.zeroturnaround.zip.ZTFilePermissionsUtil'. Only 7 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'f(double)'=>'a(double)' in class 'com.volmit.iris.noise.GlobNoise'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.gen.post.PostWallPatcher'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(java.lang.String[])'=>'b(java.lang.String[])' in class 'com.volmit.iris.gen.post.PostWallPatcher'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.noise.FastNoise'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'FastFloor(float)'=>'c(float)' in class 'com.volmit.iris.noise.FastNoise'. Only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'ValCoord3D(int, int, int, int)'=>'b(int, int, int, int)' in class 'com.volmit.iris.noise.FastNoise'. Only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(java.lang.String[])'=>'b(java.lang.String[])' in class 'com.volmit.iris.noise.FastNoise'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'FastRound(float)'=>'a(float)' in class 'com.volmit.iris.noise.FastNoise'. Only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'ValCoord2D(int, int, int)'=>'b(int, int, int)' in class 'com.volmit.iris.noise.FastNoise'. Only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'CubicLerp(float, float, float, float, float)'=>'a(float, float, float, float, float)' in class 'com.volmit.iris.noise.FastNoise'. Only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'Hash2D(int, int, int)'=>'a(int, int, int)' in class 'com.volmit.iris.noise.FastNoise'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'Hash3D(int, int, int, int)'=>'a(int, int, int, int)' in class 'com.volmit.iris.noise.FastNoise'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'Lerp(float, float, float)'=>'n(float, float, float)' in class 'com.volmit.iris.noise.FastNoise'. Only 4 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'render(double, double)'=>'a(double, double)' in class 'com.volmit.iris.gen.IrisChunkGenerator'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'verify(int, int)'=>'a(int, int)' in class 'com.volmit.iris.util.PregenJob'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'doCopyFile(java.io.File, java.io.File, boolean)'=>'a(java.io.File, java.io.File, boolean)' in class 'com.volmit.iris.util.IO'. Only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.command.PermissionIris'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(java.lang.String[])'=>'b(java.lang.String[])' in class 'com.volmit.iris.command.PermissionIris'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(java.lang.String)'=>'b(java.lang.String)' in class 'org.slf4j.LoggerFactory'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'class$(java.lang.String)'=>'d(java.lang.String)' in class 'org.slf4j.LoggerFactory'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'org.slf4j.LoggerFactory'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'bind()'=>'e()' in class 'org.slf4j.LoggerFactory'. Only 4 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'scramble(org.bukkit.inventory.Inventory, com.volmit.iris.util.RNG)'=>'a(org.bukkit.inventory.Inventory, com.volmit.iris.util.RNG)' in class 'com.volmit.iris.gen.layer.GenLayerUpdate'. Only 8 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(boolean)'=>'b(boolean)' in class 'com.volmit.iris.gen.layer.GenLayerUpdate'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.gen.layer.GenLayerUpdate'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'b()'=>'a()' in class 'com.volmit.iris.gen.layer.GenLayerUpdate'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'touchesSea(int, int)'=>'a(int, int)' in class 'com.volmit.iris.gen.TerrainChunkGenerator'. Only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'fitsWalls(com.volmit.iris.util.KList, int, int)'=>'a(com.volmit.iris.util.KList, int, int)' in class 'com.volmit.iris.object.IrisStructureTile'. Only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'getMaxHeight()'=>'a()' in class 'com.volmit.iris.object.IrisBiome'. Given that the prefix 'get' is common, only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'filter(double)'=>'a(double)' in class 'com.volmit.iris.noise.CellHeightNoise'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'filter(double)'=>'a(double)' in class 'com.volmit.iris.noise.VascularNoise'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'readTag(int)'=>'a(int)' in class 'com.volmit.iris.util.NBTInputStream'. Only 7 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(java.lang.String)'=>'b(java.lang.String)' in class 'com.volmit.iris.util.MortarPlugin'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'chain(com.volmit.iris.util.MortarPermission, org.bukkit.configuration.file.FileConfiguration)'=>'a(com.volmit.iris.util.MortarPermission, org.bukkit.configuration.file.FileConfiguration)' in class 'com.volmit.iris.util.MortarPlugin'. Only 5 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'l()' in class 'com.volmit.iris.util.MortarPlugin'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'outputInfo()'=>'n()' in class 'com.volmit.iris.util.MortarPlugin'. Only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'chain(com.volmit.iris.util.MortarCommand, java.lang.String, org.bukkit.configuration.file.FileConfiguration)'=>'a(com.volmit.iris.util.MortarCommand, java.lang.String, org.bukkit.configuration.file.FileConfiguration)' in class 'com.volmit.iris.util.MortarPlugin'. Only 5 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'f(double)'=>'a(double)' in class 'com.volmit.iris.noise.FractalCubicNoise'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(com.volmit.iris.util.MortarPlugin[])'=>'b(com.volmit.iris.util.MortarPlugin[])' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'tick()'=>'a()' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 4 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'init(org.bukkit.World, com.volmit.iris.util.RNG)'=>'a(org.bukkit.World, com.volmit.iris.util.RNG)' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 4 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.gen.ContextualChunkGenerator'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'f(double)'=>'a(double)' in class 'com.volmit.iris.noise.CubicNoise'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.util.KList'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(int[])'=>'b(int[])' in class 'com.volmit.iris.util.KList'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'pos(int, int)'=>'a(int, int)' in class 'com.volmit.iris.gen.atomics.AtomicMulticache'. Only 3 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(int)'=>'b(int)' in class 'org.zeroturnaround.zip.ZipException'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'org.zeroturnaround.zip.ZipException'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'b()'=>'a()' in class 'org.zeroturnaround.zip.ZipException'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'f(double)'=>'a(double)' in class 'com.volmit.iris.noise.WhiteNoise'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(int)'=>'b(int)' in class 'com.volmit.iris.gen.atomics.AtomicCache'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.gen.atomics.AtomicCache'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'b()'=>'a()' in class 'com.volmit.iris.gen.atomics.AtomicCache'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'mod(org.bukkit.Location)'=>'a(org.bukkit.Location)' in class 'com.volmit.iris.util.StructureTemplate'. Only 3 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(java.lang.String)'=>'b(java.lang.String)' in class 'com.volmit.iris.gui.IrisVision'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.gui.IrisVision'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'getOldest()'=>'a()' in class 'com.volmit.iris.util.ObjectResourceLoader'. Given that the prefix 'get' is common, only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'unload(java.lang.String)'=>'a(java.lang.String)' in class 'com.volmit.iris.util.ObjectResourceLoader'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'pack(java.io.File, java.util.zip.ZipOutputStream, org.zeroturnaround.zip.NameMapper, java.lang.String, boolean)'=>'a(java.io.File, java.util.zip.ZipOutputStream, org.zeroturnaround.zip.NameMapper, java.lang.String, boolean)' in class 'org.zeroturnaround.zip.ZipUtil'. Only 4 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'indent(java.io.Writer, int)'=>'a(java.io.Writer, int)' in class 'com.volmit.iris.util.JSONObject'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'write(java.io.Writer, int, int)'=>'a(java.io.Writer, int, int)' in class 'com.volmit.iris.util.JSONObject'. Only 5 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'writeValue(java.io.Writer, java.lang.Object, int, int)'=>'a(java.io.Writer, java.lang.Object, int, int)' in class 'com.volmit.iris.util.JSONObject'. Only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'getConfig()'=>'a()' in class 'com.volmit.iris.object.IrisStructurePlacement'. Given that the prefix 'get' is common, only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'write(java.io.Writer, int, int)'=>'a(java.io.Writer, int, int)' in class 'com.volmit.iris.util.JSONArray'. Only 5 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'copy(byte[])'=>'a(byte[])' in class 'org.zeroturnaround.zip.extra.UnrecognizedExtraField'. Only 4 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'id(java.lang.Object, java.lang.Object)'=>'a(java.lang.Object, java.lang.Object)' in class 'com.volmit.iris.util.Violator'. Only 2 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'p(java.lang.String, java.lang.Object)'=>'a(java.lang.String, java.lang.Object)' in class 'com.volmit.iris.util.Violator'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'g(java.lang.String)'=>'a(java.lang.String)' in class 'com.volmit.iris.util.Violator'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'h(java.lang.String)'=>'b(java.lang.String)' in class 'com.volmit.iris.util.Violator'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(java.lang.String)'=>'b(java.lang.String)' in class 'org.slf4j.helpers.MarkerIgnoringBase'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'org.slf4j.helpers.MarkerIgnoringBase'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'nextBlock(com.volmit.iris.util.RNG)'=>'a(com.volmit.iris.util.RNG)' in class 'com.volmit.iris.object.IrisDepositGenerator'. Only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(int)'=>'b(int)' in class 'org.zeroturnaround.zip.extra.ZipShort'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'org.zeroturnaround.zip.extra.ZipShort'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'b()'=>'c()' in class 'org.zeroturnaround.zip.extra.ZipShort'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(boolean)'=>'b(boolean)' in class 'com.volmit.iris.Iris'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'b()'=>'o()' in class 'com.volmit.iris.Iris'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'c()'=>'p()' in class 'com.volmit.iris.Iris'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(boolean)'=>'b(boolean)' in class 'com.volmit.iris.object.IrisRegistrant'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.object.IrisRegistrant'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'b()'=>'c()' in class 'com.volmit.iris.object.IrisRegistrant'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(int)'=>'b(int)' in class 'com.volmit.iris.activation.IrisActivation2'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'com.volmit.iris.activation.IrisActivation2'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'b()'=>'c()' in class 'com.volmit.iris.activation.IrisActivation2'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'getBakedCode()'=>'d()' in class 'com.volmit.iris.activation.IrisActivation2'. Given that the prefix 'get' is common, only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'getBakedCode()'=>'a()' in class 'com.volmit.iris.activation.IrisActivation1'. Given that the prefix 'get' is common, only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a(int)'=>'b(int)' in class 'org.zeroturnaround.zip.commons.FileUtilsV2_2'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'a()'=>'b()' in class 'org.zeroturnaround.zip.commons.FileUtilsV2_2'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'b()'=>'a()' in class 'org.zeroturnaround.zip.commons.FileUtilsV2_2'. Only 1 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'getFontList()'=>'b()' in class 'com.volmit.iris.ProjectManager'. Given that the prefix 'get' is common, only 8 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'ex(com.volmit.iris.util.JSONArray, java.lang.Class, com.volmit.iris.IrisDataManager, java.lang.String)'=>'a(com.volmit.iris.util.JSONArray, java.lang.Class, com.volmit.iris.IrisDataManager, java.lang.String)' in class 'com.volmit.iris.ProjectManager'. Only 2 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'getBiomeList(com.volmit.iris.IrisDataManager)'=>'d(com.volmit.iris.IrisDataManager)' in class 'com.volmit.iris.ProjectManager'. Given that the prefix 'get' is common, only 9 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is very vulnerable to brute force attack : Method mapping 'verify(com.volmit.iris.util.JSONObject, java.lang.Object, com.volmit.iris.util.KList, java.io.File)'=>'a(com.volmit.iris.util.JSONObject, java.lang.Object, com.volmit.iris.util.KList, java.io.File)' in class 'com.volmit.iris.ProjectManager'. Only 6 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (B)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'getLootList(com.volmit.iris.IrisDataManager)'=>'g(com.volmit.iris.IrisDataManager)' in class 'com.volmit.iris.ProjectManager'. Given that the prefix 'get' is common, only 8 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'getRegionList(com.volmit.iris.IrisDataManager)'=>'h(com.volmit.iris.IrisDataManager)' in class 'com.volmit.iris.ProjectManager'. Given that the prefix 'get' is common, only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
WARNING: Auto Reflection Handling : AutoReflection hash is vulnerable to brute force attack : Method mapping 'getObjectList(com.volmit.iris.IrisDataManager)'=>'a(com.volmit.iris.IrisDataManager)' in class 'com.volmit.iris.ProjectManager'. Given that the prefix 'get' is common, only 10 characters have to be guessed in method name. If method is not actually accessed via Reflection then use ZKM Script 'accessedByReflection' statement to specify only those classes, methods and fields that are accessed by Reflection. (A)
[2020.08.31 16:32:16] Saving 368 classes in "C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\out"
WARNING: File 'C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\out\in.jar' already exists in 'C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\out'. Renaming to 'C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\out\in.jar.BACKUP'.
[2020.08.31 16:32:17] Terminating normally.

View File

@@ -1,91 +0,0 @@
{
"input": "in.jar",
"output": "out.jar",
"script": "function isRemappingEnabledForClass(node) {\n return true;\n}\nfunction isObfuscatorEnabledForClass(node) {\n return true;\n}",
"libraries": [
"lib",
"C:/Program Files/Java/jre1.8.0_221/lib"
],
"Crasher": {
"Enabled": false,
"Invalid Signatures": true,
"Empty annotation spam": true
},
"InvokeDynamic": {
"Enabled": false
},
"HWIDPRotection": {
"Enabled": false,
"HWID": ""
},
"Optimizer": {
"Enabled": true,
"Replace String.equals()": true,
"Replace String.equalsIgnoreCase()": true,
"Optimize static string calls": false
},
"LineNumberRemover": {
"Enabled": true,
"Rename local variables": true,
"Remove Line Numbers": false,
"Remove Debug Names": false,
"Add Local Variables": false,
"New SourceFile Name": ""
},
"StringEncryption": {
"Enabled": true,
"HideStrings": true,
"AES": true
},
"NumberObfuscation": {
"Enabled": true,
"Extract to Array": true,
"Obfuscate Zero": true,
"Shift": true,
"And": true,
"Multiple Instructions": true
},
"ReferenceProxy": {
"Enabled": false
},
"ShuffleMembers": {
"Enabled": true
},
"InnerClassRemover": {
"Enabled": true,
"Remap": true,
"Remove Metadata": true
},
"NameObfuscation": {
"Enabled": false,
"Excluded classes": "",
"Excluded methods": "",
"Excluded fields": ""
},
"General Settings": {
"Custom dictionary": false,
"Name dictionary": "hello,world"
},
"Packager": {
"Enabled": false,
"Use MainClass from the JAR manifest": true,
"Main class": "HelloWorld"
},
"FlowObfuscator": {
"Enabled": true,
"Mangle Comparisons": false,
"Replace GOTO": true,
"Replace If": true,
"Bad POP": false,
"Bad Concat": false,
"Mangle Switches": false,
"Mangle Return": true,
"Mangle Local Variables": false
},
"HideMembers": {
"Enabled": false
},
"Inlining": {
"Enabled": true
}
}

View File

@@ -1,91 +0,0 @@
{
"input": "in.jar",
"output": "out.jar",
"script": "function isRemappingEnabledForClass(node) {\n return true;\n}\nfunction isObfuscatorEnabledForClass(node) {\n return true;\n}",
"libraries": [
"lib",
"C:/Program Files/Java/jre1.8.0_221/lib"
],
"Crasher": {
"Enabled": false,
"Invalid Signatures": true,
"Empty annotation spam": true
},
"InvokeDynamic": {
"Enabled": false
},
"HWIDPRotection": {
"Enabled": false,
"HWID": ""
},
"Optimizer": {
"Enabled": false,
"Replace String.equals()": false,
"Replace String.equalsIgnoreCase()": true,
"Optimize static string calls": false
},
"LineNumberRemover": {
"Enabled": false,
"Rename local variables": false,
"Remove Line Numbers": false,
"Remove Debug Names": false,
"Add Local Variables": false,
"New SourceFile Name": ""
},
"StringEncryption": {
"Enabled": true,
"HideStrings": true,
"AES": false
},
"NumberObfuscation": {
"Enabled": true,
"Extract to Array": false,
"Obfuscate Zero": false,
"Shift": true,
"And": true,
"Multiple Instructions": false
},
"ReferenceProxy": {
"Enabled": false
},
"ShuffleMembers": {
"Enabled": false
},
"InnerClassRemover": {
"Enabled": false,
"Remap": false,
"Remove Metadata": false
},
"NameObfuscation": {
"Enabled": false,
"Excluded classes": "",
"Excluded methods": "",
"Excluded fields": ""
},
"General Settings": {
"Custom dictionary": false,
"Name dictionary": "hello,world"
},
"Packager": {
"Enabled": false,
"Use MainClass from the JAR manifest": true,
"Main class": "HelloWorld"
},
"FlowObfuscator": {
"Enabled": false,
"Mangle Comparisons": false,
"Replace GOTO": true,
"Replace If": false,
"Bad POP": false,
"Bad Concat": false,
"Mangle Switches": false,
"Mangle Return": false,
"Mangle Local Variables": false
},
"HideMembers": {
"Enabled": false
},
"Inlining": {
"Enabled": false
}
}

Binary file not shown.

332
lint/proguard-backup.conf Normal file
View File

@@ -0,0 +1,332 @@
-injars in.jar
-outjars out.jar
-libraryjars 'C:\Program Files\Java\jre1.8.0_221\lib\rt.jar'
-libraryjars lib
-dontshrink
-dontoptimize
-printmapping mapping.txt
-obfuscationdictionary dictionary-members.txt
-classobfuscationdictionary dictionary-classes.txt
-useuniqueclassmembernames
-flattenpackagehierarchy com.volmit.iris
-repackageclasses com.volmit.iris
-keepattributes Exceptions,InnerClasses,Signature,Deprecated,SourceFile,LineNumberTable,LocalVariable*Table,*Annotation*,Synthetic,EnclosingMethod
-adaptclassstrings
-adaptresourcefilecontents **.properties,META-INF/MANIFEST.MF,**.yml
-dontnote
-dontwarn
-keepclassmembers,allowshrinking class com.volmit.iris.object.* {
<fields>;
}
# Also keep - Enumerations. Keep the special static methods that are required in
# enumeration classes.
-keepclassmembers enum * {
public static **[] values();
public static ** valueOf(java.lang.String);
}
# Also keep - Database drivers. Keep all implementations of java.sql.Driver.
-keep class * extends java.sql.Driver
# Also keep - Swing UI L&F. Keep all extensions of javax.swing.plaf.ComponentUI,
# along with the special 'createUI' method.
-keep class * extends javax.swing.plaf.ComponentUI {
public static javax.swing.plaf.ComponentUI createUI(javax.swing.JComponent);
}
# Keep - Native method names. Keep all native class/method names.
-keepclasseswithmembers,includedescriptorclasses,allowshrinking class * {
native <methods>;
}
# Remove - System method calls. Remove all invocations of System
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.System {
public static long currentTimeMillis();
static java.lang.Class getCallerClass();
public static int identityHashCode(java.lang.Object);
public static java.lang.SecurityManager getSecurityManager();
public static java.util.Properties getProperties();
public static java.lang.String getProperty(java.lang.String);
public static java.lang.String getenv(java.lang.String);
public static java.lang.String mapLibraryName(java.lang.String);
public static java.lang.String getProperty(java.lang.String,java.lang.String);
}
# Remove - Math method calls. Remove all invocations of Math
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.Math {
public static double sin(double);
public static double cos(double);
public static double tan(double);
public static double asin(double);
public static double acos(double);
public static double atan(double);
public static double toRadians(double);
public static double toDegrees(double);
public static double exp(double);
public static double log(double);
public static double log10(double);
public static double sqrt(double);
public static double cbrt(double);
public static double IEEEremainder(double,double);
public static double ceil(double);
public static double floor(double);
public static double rint(double);
public static double atan2(double,double);
public static double pow(double,double);
public static int round(float);
public static long round(double);
public static double random();
public static int abs(int);
public static long abs(long);
public static float abs(float);
public static double abs(double);
public static int max(int,int);
public static long max(long,long);
public static float max(float,float);
public static double max(double,double);
public static int min(int,int);
public static long min(long,long);
public static float min(float,float);
public static double min(double,double);
public static double ulp(double);
public static float ulp(float);
public static double signum(double);
public static float signum(float);
public static double sinh(double);
public static double cosh(double);
public static double tanh(double);
public static double hypot(double,double);
public static double expm1(double);
public static double log1p(double);
}
# Remove - Number method calls. Remove all invocations of Number
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.* extends java.lang.Number {
public static java.lang.String toString(byte);
public static java.lang.Byte valueOf(byte);
public static byte parseByte(java.lang.String);
public static byte parseByte(java.lang.String,int);
public static java.lang.Byte valueOf(java.lang.String,int);
public static java.lang.Byte valueOf(java.lang.String);
public static java.lang.Byte decode(java.lang.String);
public int compareTo(java.lang.Byte);
public static java.lang.String toString(short);
public static short parseShort(java.lang.String);
public static short parseShort(java.lang.String,int);
public static java.lang.Short valueOf(java.lang.String,int);
public static java.lang.Short valueOf(java.lang.String);
public static java.lang.Short valueOf(short);
public static java.lang.Short decode(java.lang.String);
public static short reverseBytes(short);
public int compareTo(java.lang.Short);
public static java.lang.String toString(int,int);
public static java.lang.String toHexString(int);
public static java.lang.String toOctalString(int);
public static java.lang.String toBinaryString(int);
public static java.lang.String toString(int);
public static int parseInt(java.lang.String,int);
public static int parseInt(java.lang.String);
public static java.lang.Integer valueOf(java.lang.String,int);
public static java.lang.Integer valueOf(java.lang.String);
public static java.lang.Integer valueOf(int);
public static java.lang.Integer getInteger(java.lang.String);
public static java.lang.Integer getInteger(java.lang.String,int);
public static java.lang.Integer getInteger(java.lang.String,java.lang.Integer);
public static java.lang.Integer decode(java.lang.String);
public static int highestOneBit(int);
public static int lowestOneBit(int);
public static int numberOfLeadingZeros(int);
public static int numberOfTrailingZeros(int);
public static int bitCount(int);
public static int rotateLeft(int,int);
public static int rotateRight(int,int);
public static int reverse(int);
public static int signum(int);
public static int reverseBytes(int);
public int compareTo(java.lang.Integer);
public static java.lang.String toString(long,int);
public static java.lang.String toHexString(long);
public static java.lang.String toOctalString(long);
public static java.lang.String toBinaryString(long);
public static java.lang.String toString(long);
public static long parseLong(java.lang.String,int);
public static long parseLong(java.lang.String);
public static java.lang.Long valueOf(java.lang.String,int);
public static java.lang.Long valueOf(java.lang.String);
public static java.lang.Long valueOf(long);
public static java.lang.Long decode(java.lang.String);
public static java.lang.Long getLong(java.lang.String);
public static java.lang.Long getLong(java.lang.String,long);
public static java.lang.Long getLong(java.lang.String,java.lang.Long);
public static long highestOneBit(long);
public static long lowestOneBit(long);
public static int numberOfLeadingZeros(long);
public static int numberOfTrailingZeros(long);
public static int bitCount(long);
public static long rotateLeft(long,int);
public static long rotateRight(long,int);
public static long reverse(long);
public static int signum(long);
public static long reverseBytes(long);
public int compareTo(java.lang.Long);
public static java.lang.String toString(float);
public static java.lang.String toHexString(float);
public static java.lang.Float valueOf(java.lang.String);
public static java.lang.Float valueOf(float);
public static float parseFloat(java.lang.String);
public static boolean isNaN(float);
public static boolean isInfinite(float);
public static int floatToIntBits(float);
public static int floatToRawIntBits(float);
public static float intBitsToFloat(int);
public static int compare(float,float);
public boolean isNaN();
public boolean isInfinite();
public int compareTo(java.lang.Float);
public static java.lang.String toString(double);
public static java.lang.String toHexString(double);
public static java.lang.Double valueOf(java.lang.String);
public static java.lang.Double valueOf(double);
public static double parseDouble(java.lang.String);
public static boolean isNaN(double);
public static boolean isInfinite(double);
public static long doubleToLongBits(double);
public static long doubleToRawLongBits(double);
public static double longBitsToDouble(long);
public static int compare(double,double);
public boolean isNaN();
public boolean isInfinite();
public int compareTo(java.lang.Double);
public byte byteValue();
public short shortValue();
public int intValue();
public long longValue();
public float floatValue();
public double doubleValue();
public int compareTo(java.lang.Object);
public boolean equals(java.lang.Object);
public int hashCode();
public java.lang.String toString();
}
# Remove - String method calls. Remove all invocations of String
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.String {
public static java.lang.String copyValueOf(char[]);
public static java.lang.String copyValueOf(char[],int,int);
public static java.lang.String valueOf(boolean);
public static java.lang.String valueOf(char);
public static java.lang.String valueOf(char[]);
public static java.lang.String valueOf(char[],int,int);
public static java.lang.String valueOf(double);
public static java.lang.String valueOf(float);
public static java.lang.String valueOf(int);
public static java.lang.String valueOf(java.lang.Object);
public static java.lang.String valueOf(long);
public boolean contentEquals(java.lang.StringBuffer);
public boolean endsWith(java.lang.String);
public boolean equalsIgnoreCase(java.lang.String);
public boolean equals(java.lang.Object);
public boolean matches(java.lang.String);
public boolean regionMatches(boolean,int,java.lang.String,int,int);
public boolean regionMatches(int,java.lang.String,int,int);
public boolean startsWith(java.lang.String);
public boolean startsWith(java.lang.String,int);
public byte[] getBytes();
public byte[] getBytes(java.lang.String);
public char charAt(int);
public char[] toCharArray();
public int compareToIgnoreCase(java.lang.String);
public int compareTo(java.lang.Object);
public int compareTo(java.lang.String);
public int hashCode();
public int indexOf(int);
public int indexOf(int,int);
public int indexOf(java.lang.String);
public int indexOf(java.lang.String,int);
public int lastIndexOf(int);
public int lastIndexOf(int,int);
public int lastIndexOf(java.lang.String);
public int lastIndexOf(java.lang.String,int);
public int length();
public java.lang.CharSequence subSequence(int,int);
public java.lang.String concat(java.lang.String);
public java.lang.String replaceAll(java.lang.String,java.lang.String);
public java.lang.String replace(char,char);
public java.lang.String replaceFirst(java.lang.String,java.lang.String);
public java.lang.String[] split(java.lang.String);
public java.lang.String[] split(java.lang.String,int);
public java.lang.String substring(int);
public java.lang.String substring(int,int);
public java.lang.String toLowerCase();
public java.lang.String toLowerCase(java.util.Locale);
public java.lang.String toString();
public java.lang.String toUpperCase();
public java.lang.String toUpperCase(java.util.Locale);
public java.lang.String trim();
}
# Remove - StringBuffer method calls. Remove all invocations of StringBuffer
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.StringBuffer {
public java.lang.String toString();
public char charAt(int);
public int capacity();
public int codePointAt(int);
public int codePointBefore(int);
public int indexOf(java.lang.String,int);
public int lastIndexOf(java.lang.String);
public int lastIndexOf(java.lang.String,int);
public int length();
public java.lang.String substring(int);
public java.lang.String substring(int,int);
}
# Remove - StringBuilder method calls. Remove all invocations of StringBuilder
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.StringBuilder {
public java.lang.String toString();
public char charAt(int);
public int capacity();
public int codePointAt(int);
public int codePointBefore(int);
public int indexOf(java.lang.String,int);
public int lastIndexOf(java.lang.String);
public int lastIndexOf(java.lang.String,int);
public int length();
public java.lang.String substring(int);
public java.lang.String substring(int,int);
}
# Remove debugging - Throwable_printStackTrace calls. Remove all invocations of
# Throwable.printStackTrace().
-assumenosideeffects public class java.lang.Throwable {
public void printStackTrace();
}
# Remove debugging - Thread_dumpStack calls. Remove all invocations of
# Thread.dumpStack().
-assumenosideeffects public class java.lang.Thread {
public static void dumpStack();
}
# Remove debugging - All logging API calls. Remove all invocations of the
# logging API whose return values are not used.
-assumenosideeffects public class java.util.logging.* {
<methods>;
}
# Remove debugging - All Log4j API calls. Remove all invocations of the
# Log4j API whose return values are not used.
-assumenosideeffects public class org.apache.log4j.** {
<methods>;
}

View File

@@ -4,8 +4,9 @@
-libraryjars 'C:\Program Files\Java\jre1.8.0_221\lib\rt.jar' -libraryjars 'C:\Program Files\Java\jre1.8.0_221\lib\rt.jar'
-libraryjars lib -libraryjars lib
-dontskipnonpubliclibraryclassmembers
-dontshrink -dontshrink
-dontoptimize -optimizations !code/simplification/advanced,code/simplification/*
-printmapping mapping.txt -printmapping mapping.txt
-obfuscationdictionary dictionary-members.txt -obfuscationdictionary dictionary-members.txt
-classobfuscationdictionary dictionary-classes.txt -classobfuscationdictionary dictionary-classes.txt
@@ -15,8 +16,7 @@
-keepattributes Exceptions,InnerClasses,Signature,Deprecated,SourceFile,LineNumberTable,LocalVariable*Table,*Annotation*,Synthetic,EnclosingMethod -keepattributes Exceptions,InnerClasses,Signature,Deprecated,SourceFile,LineNumberTable,LocalVariable*Table,*Annotation*,Synthetic,EnclosingMethod
-adaptclassstrings -adaptclassstrings
-adaptresourcefilecontents **.properties,META-INF/MANIFEST.MF,**.yml -adaptresourcefilecontents **.properties,META-INF/MANIFEST.MF,**.yml
-dontnote -verbose
-dontwarn
@@ -44,289 +44,3 @@
-keepclasseswithmembers,includedescriptorclasses,allowshrinking class * { -keepclasseswithmembers,includedescriptorclasses,allowshrinking class * {
native <methods>; native <methods>;
} }
# Remove - System method calls. Remove all invocations of System
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.System {
public static long currentTimeMillis();
static java.lang.Class getCallerClass();
public static int identityHashCode(java.lang.Object);
public static java.lang.SecurityManager getSecurityManager();
public static java.util.Properties getProperties();
public static java.lang.String getProperty(java.lang.String);
public static java.lang.String getenv(java.lang.String);
public static java.lang.String mapLibraryName(java.lang.String);
public static java.lang.String getProperty(java.lang.String,java.lang.String);
}
# Remove - Math method calls. Remove all invocations of Math
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.Math {
public static double sin(double);
public static double cos(double);
public static double tan(double);
public static double asin(double);
public static double acos(double);
public static double atan(double);
public static double toRadians(double);
public static double toDegrees(double);
public static double exp(double);
public static double log(double);
public static double log10(double);
public static double sqrt(double);
public static double cbrt(double);
public static double IEEEremainder(double,double);
public static double ceil(double);
public static double floor(double);
public static double rint(double);
public static double atan2(double,double);
public static double pow(double,double);
public static int round(float);
public static long round(double);
public static double random();
public static int abs(int);
public static long abs(long);
public static float abs(float);
public static double abs(double);
public static int max(int,int);
public static long max(long,long);
public static float max(float,float);
public static double max(double,double);
public static int min(int,int);
public static long min(long,long);
public static float min(float,float);
public static double min(double,double);
public static double ulp(double);
public static float ulp(float);
public static double signum(double);
public static float signum(float);
public static double sinh(double);
public static double cosh(double);
public static double tanh(double);
public static double hypot(double,double);
public static double expm1(double);
public static double log1p(double);
}
# Remove - Number method calls. Remove all invocations of Number
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.* extends java.lang.Number {
public static java.lang.String toString(byte);
public static java.lang.Byte valueOf(byte);
public static byte parseByte(java.lang.String);
public static byte parseByte(java.lang.String,int);
public static java.lang.Byte valueOf(java.lang.String,int);
public static java.lang.Byte valueOf(java.lang.String);
public static java.lang.Byte decode(java.lang.String);
public int compareTo(java.lang.Byte);
public static java.lang.String toString(short);
public static short parseShort(java.lang.String);
public static short parseShort(java.lang.String,int);
public static java.lang.Short valueOf(java.lang.String,int);
public static java.lang.Short valueOf(java.lang.String);
public static java.lang.Short valueOf(short);
public static java.lang.Short decode(java.lang.String);
public static short reverseBytes(short);
public int compareTo(java.lang.Short);
public static java.lang.String toString(int,int);
public static java.lang.String toHexString(int);
public static java.lang.String toOctalString(int);
public static java.lang.String toBinaryString(int);
public static java.lang.String toString(int);
public static int parseInt(java.lang.String,int);
public static int parseInt(java.lang.String);
public static java.lang.Integer valueOf(java.lang.String,int);
public static java.lang.Integer valueOf(java.lang.String);
public static java.lang.Integer valueOf(int);
public static java.lang.Integer getInteger(java.lang.String);
public static java.lang.Integer getInteger(java.lang.String,int);
public static java.lang.Integer getInteger(java.lang.String,java.lang.Integer);
public static java.lang.Integer decode(java.lang.String);
public static int highestOneBit(int);
public static int lowestOneBit(int);
public static int numberOfLeadingZeros(int);
public static int numberOfTrailingZeros(int);
public static int bitCount(int);
public static int rotateLeft(int,int);
public static int rotateRight(int,int);
public static int reverse(int);
public static int signum(int);
public static int reverseBytes(int);
public int compareTo(java.lang.Integer);
public static java.lang.String toString(long,int);
public static java.lang.String toHexString(long);
public static java.lang.String toOctalString(long);
public static java.lang.String toBinaryString(long);
public static java.lang.String toString(long);
public static long parseLong(java.lang.String,int);
public static long parseLong(java.lang.String);
public static java.lang.Long valueOf(java.lang.String,int);
public static java.lang.Long valueOf(java.lang.String);
public static java.lang.Long valueOf(long);
public static java.lang.Long decode(java.lang.String);
public static java.lang.Long getLong(java.lang.String);
public static java.lang.Long getLong(java.lang.String,long);
public static java.lang.Long getLong(java.lang.String,java.lang.Long);
public static long highestOneBit(long);
public static long lowestOneBit(long);
public static int numberOfLeadingZeros(long);
public static int numberOfTrailingZeros(long);
public static int bitCount(long);
public static long rotateLeft(long,int);
public static long rotateRight(long,int);
public static long reverse(long);
public static int signum(long);
public static long reverseBytes(long);
public int compareTo(java.lang.Long);
public static java.lang.String toString(float);
public static java.lang.String toHexString(float);
public static java.lang.Float valueOf(java.lang.String);
public static java.lang.Float valueOf(float);
public static float parseFloat(java.lang.String);
public static boolean isNaN(float);
public static boolean isInfinite(float);
public static int floatToIntBits(float);
public static int floatToRawIntBits(float);
public static float intBitsToFloat(int);
public static int compare(float,float);
public boolean isNaN();
public boolean isInfinite();
public int compareTo(java.lang.Float);
public static java.lang.String toString(double);
public static java.lang.String toHexString(double);
public static java.lang.Double valueOf(java.lang.String);
public static java.lang.Double valueOf(double);
public static double parseDouble(java.lang.String);
public static boolean isNaN(double);
public static boolean isInfinite(double);
public static long doubleToLongBits(double);
public static long doubleToRawLongBits(double);
public static double longBitsToDouble(long);
public static int compare(double,double);
public boolean isNaN();
public boolean isInfinite();
public int compareTo(java.lang.Double);
public byte byteValue();
public short shortValue();
public int intValue();
public long longValue();
public float floatValue();
public double doubleValue();
public int compareTo(java.lang.Object);
public boolean equals(java.lang.Object);
public int hashCode();
public java.lang.String toString();
}
# Remove - String method calls. Remove all invocations of String
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.String {
public static java.lang.String copyValueOf(char[]);
public static java.lang.String copyValueOf(char[],int,int);
public static java.lang.String valueOf(boolean);
public static java.lang.String valueOf(char);
public static java.lang.String valueOf(char[]);
public static java.lang.String valueOf(char[],int,int);
public static java.lang.String valueOf(double);
public static java.lang.String valueOf(float);
public static java.lang.String valueOf(int);
public static java.lang.String valueOf(java.lang.Object);
public static java.lang.String valueOf(long);
public boolean contentEquals(java.lang.StringBuffer);
public boolean endsWith(java.lang.String);
public boolean equalsIgnoreCase(java.lang.String);
public boolean equals(java.lang.Object);
public boolean matches(java.lang.String);
public boolean regionMatches(boolean,int,java.lang.String,int,int);
public boolean regionMatches(int,java.lang.String,int,int);
public boolean startsWith(java.lang.String);
public boolean startsWith(java.lang.String,int);
public byte[] getBytes();
public byte[] getBytes(java.lang.String);
public char charAt(int);
public char[] toCharArray();
public int compareToIgnoreCase(java.lang.String);
public int compareTo(java.lang.Object);
public int compareTo(java.lang.String);
public int hashCode();
public int indexOf(int);
public int indexOf(int,int);
public int indexOf(java.lang.String);
public int indexOf(java.lang.String,int);
public int lastIndexOf(int);
public int lastIndexOf(int,int);
public int lastIndexOf(java.lang.String);
public int lastIndexOf(java.lang.String,int);
public int length();
public java.lang.CharSequence subSequence(int,int);
public java.lang.String concat(java.lang.String);
public java.lang.String replaceAll(java.lang.String,java.lang.String);
public java.lang.String replace(char,char);
public java.lang.String replaceFirst(java.lang.String,java.lang.String);
public java.lang.String[] split(java.lang.String);
public java.lang.String[] split(java.lang.String,int);
public java.lang.String substring(int);
public java.lang.String substring(int,int);
public java.lang.String toLowerCase();
public java.lang.String toLowerCase(java.util.Locale);
public java.lang.String toString();
public java.lang.String toUpperCase();
public java.lang.String toUpperCase(java.util.Locale);
public java.lang.String trim();
}
# Remove - StringBuffer method calls. Remove all invocations of StringBuffer
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.StringBuffer {
public java.lang.String toString();
public char charAt(int);
public int capacity();
public int codePointAt(int);
public int codePointBefore(int);
public int indexOf(java.lang.String,int);
public int lastIndexOf(java.lang.String);
public int lastIndexOf(java.lang.String,int);
public int length();
public java.lang.String substring(int);
public java.lang.String substring(int,int);
}
# Remove - StringBuilder method calls. Remove all invocations of StringBuilder
# methods without side effects whose return values are not used.
-assumenosideeffects public class java.lang.StringBuilder {
public java.lang.String toString();
public char charAt(int);
public int capacity();
public int codePointAt(int);
public int codePointBefore(int);
public int indexOf(java.lang.String,int);
public int lastIndexOf(java.lang.String);
public int lastIndexOf(java.lang.String,int);
public int length();
public java.lang.String substring(int);
public java.lang.String substring(int,int);
}
# Remove debugging - Throwable_printStackTrace calls. Remove all invocations of
# Throwable.printStackTrace().
-assumenosideeffects public class java.lang.Throwable {
public void printStackTrace();
}
# Remove debugging - Thread_dumpStack calls. Remove all invocations of
# Thread.dumpStack().
-assumenosideeffects public class java.lang.Thread {
public static void dumpStack();
}
# Remove debugging - All logging API calls. Remove all invocations of the
# logging API whose return values are not used.
-assumenosideeffects public class java.util.logging.* {
<methods>;
}
# Remove debugging - All Log4j API calls. Remove all invocations of the
# Log4j API whose return values are not used.
-assumenosideeffects public class org.apache.log4j.** {
<methods>;
}

60
lint/proguard.conf2 Normal file
View File

@@ -0,0 +1,60 @@
-injars in.jar
-outjars out.jar
-libraryjars 'C:\Program Files\Java\jre1.8.0_221\lib\rt.jar'
-libraryjars lib
-dontskipnonpubliclibraryclassmembers
-dontshrink
-optimizations code/simplification/arithmetic,code/simplification/string,code/simplification/math
-printmapping mapping.txt
-obfuscationdictionary dictionary-members.txt
-classobfuscationdictionary dictionary-classes.txt
-useuniqueclassmembernames
-flattenpackagehierarchy com.volmit.iris
-repackageclasses com.volmit.iris
-keepattributes Exceptions,InnerClasses,Signature,Deprecated,SourceFile,LineNumberTable,LocalVariable*Table,*Annotation*,Synthetic,EnclosingMethod
-adaptclassstrings
-adaptresourcefilecontents **.properties,META-INF/MANIFEST.MF,**.yml
-verbose
-keepclasseswithmembers class com.volmit.iris.** {
<fields>;
<methods>;
}
-keepclassmembers,allowshrinking class com.volmit.iris.object.* {
<fields>;
}
# Also keep - Enumerations. Keep the special static methods that are required in
# enumeration classes.
-keepclassmembers enum * {
public static **[] values();
public static ** valueOf(java.lang.String);
}
# Also keep - Database drivers. Keep all implementations of java.sql.Driver.
-keep class * extends java.sql.Driver
# Also keep - Swing UI L&F. Keep all extensions of javax.swing.plaf.ComponentUI,
# along with the special 'createUI' method.
-keep class * extends javax.swing.plaf.ComponentUI {
public static javax.swing.plaf.ComponentUI createUI(javax.swing.JComponent);
}
# Keep - Native method names. Keep all native class/method names.
-keepclasseswithmembers,includedescriptorclasses,allowshrinking class * {
native <methods>;
}
-assumenosideeffects public class * extends org.bukkit.plugin.java.JavaPlugin {
<methods>;
public <methods>;
}
-assumenosideeffects public class * extends com.volmit.iris.util.MortarPlugin {
public <methods>;
}

View File

@@ -1,72 +0,0 @@
/*******************************************************************************/
/* Generated by Zelix KlassMaster 13.0.0 ZKM Script Helper 2020.08.25 16:30:31 */
/*******************************************************************************/
classpath "C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\ZKM.jar"
"C:\Program Files\Java\jre1.8.0_221\lib\resources.jar"
"C:\Program Files\Java\jre1.8.0_221\lib\rt.jar"
"C:\Program Files\Java\jre1.8.0_221\lib\jsse.jar"
"C:\Program Files\Java\jre1.8.0_221\lib\jce.jar"
"C:\Program Files\Java\jre1.8.0_221\lib\charsets.jar"
"C:\Program Files\Java\jre1.8.0_221\lib\jfr.jar"
"C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\bungeecord-api.jar"
"C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\lombok-1.18.10.jar"
"C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\slf4j-simp.jar"
"C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\spigot-api-1.16.1.jar"
"C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\lib\spigot.jar";
open "C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\in.jar";
trimExclude *.Iris and
* extends com.volmit.iris.util.MortarCommand and
*.* @com.volmit.iris.util.Command * and
@com.volmit.iris.gen.post.Post *.* and
@org.bukkit.event.EventHandler *.* and
*.* @org.bukkit.event.EventHandler * and
*.* @org.bukkit.event.EventHandler *(*) and
*.* extends com.volmit.iris.util.IrisPostBlockFilter;
trim deleteSourceFileAttributes=false
deleteDeprecatedAttributes=false
deleteAnnotationAttributes=false
deleteExceptionAttributes=false
deleteUnknownAttributes=false;
exclude @com.volmit.iris.util.DontObfuscate *.* and
*.* @com.volmit.iris.util.DontObfuscate * and
*.* @com.volmit.iris.util.DontObfuscate *(*) and
*.Iris and
@org.bukkit.event.EventHandler *.* and
*.* @org.bukkit.event.EventHandler * and
*.* @org.bukkit.event.EventHandler *(*) and
public *.^* and
*.* public * and
*.* protected * and
*.* public *(*) and
*.* protected *(*) and
com.google.*. and
*.TypeAdapter and
com.google.gson.^TypeAdapter *(*) and
com.google.gson.^* *(*) and
*.* extends com.volmit.iris.util.IrisPostBlockFilter *(*) and
*.PostBlockChunkGenerator * and
*.PostBlockChunkGenerator *(*) and
com.volmit.iris.gen.post.^* and
com.volmit.iris.gen.post.;
obfuscate changeLogFileIn=""
changeLogFileOut="ChangeLog.txt"
keepInnerClassInfo=true
obfuscateFlow=normal
exceptionObfuscation=light
encryptStringLiterals=flowObfuscate
mixedCaseClassNames=false
randomize=true
localVariables=obfuscate
lineNumbers=scramble
autoReflectionHandling=normal
obfuscateReferences=none
methodParameterChanges=flowObfuscate
keepBalancedLocks=true;
saveAll archiveCompression=all "C:\Users\cyberpwn\Documents\development\workspace\Iris\lint\out";

22
pom.xml
View File

@@ -4,7 +4,7 @@
<modelVersion>4.0.0</modelVersion> <modelVersion>4.0.0</modelVersion>
<groupId>bytecode.ninja</groupId> <groupId>bytecode.ninja</groupId>
<artifactId>Iris</artifactId> <artifactId>Iris</artifactId>
<version>1.0</version> <version>1.0.1</version>
<name>Iris</name> <name>Iris</name>
<properties> <properties>
<skip.copy>false</skip.copy> <skip.copy>false</skip.copy>
@@ -43,6 +43,11 @@
</goals> </goals>
<configuration> <configuration>
<minimizeJar>false</minimizeJar> <minimizeJar>false</minimizeJar>
<artifactSet>
<excludes>
<exclude>org.slf4j:*</exclude>
</excludes>
</artifactSet>
</configuration> </configuration>
</execution> </execution>
</executions> </executions>
@@ -148,6 +153,10 @@
<id>bcn</id> <id>bcn</id>
<url>http://bytecode.ninja/repository/bcn/</url> <url>http://bytecode.ninja/repository/bcn/</url>
</repository> </repository>
<repository>
<id>CodeMC</id>
<url>https://repo.codemc.org/repository/maven-public</url>
</repository>
</repositories> </repositories>
<dependencies> <dependencies>
<!-- Spigot API --> <!-- Spigot API -->
@@ -157,13 +166,12 @@
<version>1.16.1-R0.1-SNAPSHOT</version> <version>1.16.1-R0.1-SNAPSHOT</version>
<scope>provided</scope> <scope>provided</scope>
</dependency> </dependency>
<dependency>
<groupId>org.bukkit.craftbukkit</groupId>
<artifactId>cb-1.16.2</artifactId>
<version>1.16.2</version>
<scope>provided</scope>
</dependency>
<!-- Utilities --> <!-- Utilities -->
<dependency>
<groupId>org.bstats</groupId>
<artifactId>bstats-bukkit</artifactId>
<version>1.7</version>
</dependency>
<dependency> <dependency>
<groupId>org.projectlombok</groupId> <groupId>org.projectlombok</groupId>
<artifactId>lombok</artifactId> <artifactId>lombok</artifactId>

View File

@@ -1,22 +0,0 @@
@Echo off
echo Apply Script: COPY
echo F|xcopy /y /s /f /q "%1" "%2"
echo F|xcopy /y /s /f /q "lint/in.jar" "release/latest/Origin-%3.jar"
echo Starting the Washing Machine
cd lint
echo ZKM Rinse Cycle
java -Xmx4g -Xms1m -jar ZKM.jar script.zkm
echo F|xcopy /y /f /q "out/in.jar" "in.jar"
echo Powerwash Cycle
java -Xmx4g -Xms1m -jar obfuscator.jar --jarIn in.jar --jarOut out.jar --config obf.json
echo F|xcopy /y /f /q "out.jar" "in.jar"
echo Rinse Cycle
java -Xmx4g -Xms1m -jar proguard.jar @proguard.conf
cd ..
echo F|xcopy /y /s /f /q "lint/out.jar" "release/latest/Iris-%3.jar"
cd release
echo F|xcopy /y /s /f /q /E "latest" "%3/"

View File

@@ -4,11 +4,10 @@ echo F|xcopy /y /s /f /q "%1" "%2"
echo F|xcopy /y /s /f /q "lint/in.jar" "release/latest/Origin-%3.jar" echo F|xcopy /y /s /f /q "lint/in.jar" "release/latest/Origin-%3.jar"
echo Starting the Washing Machine echo Starting the Washing Machine
cd lint cd lint
echo Rinse Cycle
java -Xmx4g -Xms1m -jar proguard.jar @proguard.conf java -Xmx4g -Xms1m -jar proguard.jar @proguard.conf
cd .. cd ..
echo F|xcopy /y /s /f /q "lint/out.jar" "release/latest/Iris-%3.jar" echo F|xcopy /y /s /f /q "lint/out.jar" "release/latest/Iris-%3.jar"
echo F|xcopy /y /s /f /q "lint/mapping.txt" "release/latest/mapping-%3.txt"
cd release cd release
echo F|xcopy /y /s /f /q /E "latest" "%3/" echo F|xcopy /y /s /f /q /E "latest" "%3/"
rmdir /Q/S latest

View File

@@ -6,6 +6,7 @@ import java.io.FileOutputStream;
import java.io.IOException; import java.io.IOException;
import java.net.URL; import java.net.URL;
import org.bstats.bukkit.Metrics;
import org.bukkit.Bukkit; import org.bukkit.Bukkit;
import org.bukkit.World; import org.bukkit.World;
import org.bukkit.command.Command; import org.bukkit.command.Command;
@@ -115,10 +116,16 @@ public class Iris extends MortarPlugin
board = new IrisBoardManager(); board = new IrisBoardManager();
linkMultiverseCore = new MultiverseCoreLink(); linkMultiverseCore = new MultiverseCoreLink();
J.a(() -> IO.delete(getTemp())); J.a(() -> IO.delete(getTemp()));
J.a(() -> bstats());
J.s(this::splash, 20); J.s(this::splash, 20);
super.onEnable(); super.onEnable();
} }
private void bstats()
{
new Metrics(this, 8757);
}
public static File getTemp() public static File getTemp()
{ {
return instance.getDataFolder("cache", "temp"); return instance.getDataFolder("cache", "temp");

View File

@@ -42,6 +42,10 @@ public class IrisSettings
@Desc("When using studio open or create, open the codeworkspace automatically.") @Desc("When using studio open or create, open the codeworkspace automatically.")
public boolean openVSCode = true; public boolean openVSCode = true;
@DontObfuscate
@Desc("Collects anonymous metrics for bstats")
public boolean metrics = true;
@DontObfuscate @DontObfuscate
@Desc("Used to activate Iris") @Desc("Used to activate Iris")
public String activationCode = ""; public String activationCode = "";

View File

@@ -7,6 +7,11 @@ public class PermissionIris extends MortarPermission
{ {
@Permission @Permission
public PermissionIrisStudio studio; public PermissionIrisStudio studio;
public PermissionIris()
{
super();
}
@Override @Override
protected String getNode() protected String getNode()

View File

@@ -4,6 +4,11 @@ import com.volmit.iris.util.MortarPermission;
public class PermissionIrisStudio extends MortarPermission public class PermissionIrisStudio extends MortarPermission
{ {
public PermissionIrisStudio()
{
super();
}
@Override @Override
protected String getNode() protected String getNode()
{ {

View File

@@ -1,9 +0,0 @@
package com.volmit.iris.util;
public abstract class A implements Runnable
{
public A()
{
J.a(this);
}
}

View File

@@ -1,31 +0,0 @@
package com.volmit.iris.util;
import org.bukkit.util.Vector;
public enum Axis
{
X(1, 0, 0),
Y(0, 1, 0),
Z(0, 0, 1);
private int x;
private int y;
private int z;
private Axis(int x, int y, int z)
{
this.x = x;
this.y = y;
this.z = z;
}
public Vector positive()
{
return new Vector(x, y, z);
}
public Vector negative()
{
return VectorMath.reverse(positive());
}
}

View File

@@ -1,8 +0,0 @@
package com.volmit.iris.util;
import com.volmit.iris.object.IrisBiome;
public class BiomeDominance extends KMap<IrisBiome, Double>
{
private static final long serialVersionUID = 9055245062942178392L;
}

View File

@@ -1,23 +0,0 @@
package com.volmit.iris.util;
import com.volmit.iris.object.IrisBiome;
import lombok.Data;
@Data
public class BiomeResult
{
private IrisBiome biome;
private double distance;
public BiomeResult(IrisBiome biome, double distance)
{
this.biome = biome;
this.distance = distance;
}
public boolean is(BiomeResult r)
{
return biome.getName().equals(r.biome.getName());
}
}

View File

@@ -1,7 +0,0 @@
package com.volmit.iris.util;
@FunctionalInterface
public interface BorderCheck<T>
{
public T get(double x, double z);
}

View File

@@ -1,42 +0,0 @@
package com.volmit.iris.util;
public class Borders
{
public static <T> double getDistanceToBorder(double x, double z, int samples, double minRadius, double maxRadius, double jump, BorderCheck<T> check)
{
double offset = 0;
double fract = 1;
for(double i = minRadius; i < maxRadius; i += jump * fract)
{
offset += jump / 3D;
fract += 0.333;
if(isBorderWithin(x, z, samples, maxRadius, offset, check))
{
return minRadius;
}
}
return maxRadius;
}
public static <T> boolean isBorderWithin(double x, double z, int samples, double radius, double offset, BorderCheck<T> check)
{
T center = check.get(x, z);
double ajump = Math.toRadians(360D / (double) samples) + offset;
for(int i = 0; i < samples; i++)
{
double dx = M.sin((float) ajump * i) * radius;
double dz = M.cos((float) ajump * i) * radius;
if(!center.equals(check.get(x + dx, z + dz)))
{
return true;
}
}
return false;
}
}