Fungal Infiltration "I'm in."

1
The power to issue commands to technological devices.
Used by Amanita, Created by mobius.
(When activating this Effect, it is obvious you are interacting with the target. )

True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. They scrub the system of footprints, leaving no trace behind.


Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you experience a S-4 injury as the device explodes. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Community Hack Gifts

Spend 2 Actions. Select a Computer within 20 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Every hack you make leaves behind a sheriff's star icon. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

This Gift's Cost is capped at 2 and cannot be increased further.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 2 Actions. Select a Device within 20 feet. Does not work on Alien technology. You must actively and obviously use an electronic device to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind a partially-filled loading logo in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 2 Actions to activate. Select a Computer within 300 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

  • You can target yourself if you qualify as a valid target by the other requirements.

Exert your Mind and spend 1 minute to activate. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a glitchy laughing skull in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of Chiaki in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.