By focusing, the Thief may shroud their hands in shadowy tendrils that seek nearby objects like static-charged hairs. They cast themselves across any surface the Thief touches, acting as anchors that allow the Thief to scale even the sheerest walls.
Exert your Mind and spend an Action.
You may move easily and without a roll in any of the following situations. Lasts 2 hours.
A golden Lotus pattern begins revolving in Amarjeet's eyes. After the Hack is completed, an identical pattern will be displayed somewhere on the UI of the affected device.
The Lotus III implant has been upgraded. Sophisticated decryption & code-breaking software is pre-loaded into the implant, optimized to synchronize with the end-user's conscious attempts to crack security systems. Capable of defeating the most sophisticated systems in moments, use of this feature causes the user's eyes to display the familiar Lotus Logo as a revolving pattern on the iris. Additionally, in what we consider to be a win for our marketing team, any device compromised by our software will display our Lotus Logo in system - all the better to alert potential clients of system vulnerabilities.
Operating the system linkage on a regular basis has been proven to damage the optic nerves: always use caution when operating prototype cybernetics.
Exert your Mind and spend 1 Action. Select a Computer within 300 feet. Can be used on Alien technology. Roll a single D10 as a critical failure check. If you roll a 1, the Effect fails, and you go Blind. Roll Perception + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind Lotus Logo in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
She has always demanded the world's protection in a solidified and true manner... this allows her to do so.
You gain the following benefits at all times.
You have 3 Armor, which reduces incoming Damage. Armor from multiple sources does not stack. This Armor cannot be circumvented with Called Shots.
Kanni's fingers split open, revealing minute tools, which promptly begin to work constructing and implementing various codes and objects into the computer, allowing Kanni complete access to the system while she works.
Spend 1 minute. Select a Computer within arm's reach. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
Your command does not have to take effect immediately. Instead, upon a successful Hack, you may specify a condition under which the specified command is issued or simply suspend the Command until you desire to activate it.
Every hack you make leaves behind Any lights attached to the system turning purple and yellow in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.
Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see Kanni's fingers split open and fold back, many tools revealing themselves as they begin to pluck and play with the device, scanning, prodding, etc.
This Gift cannot have more than 3 Drawbacks, and its Gift Cost is capped at 2.
Whenever Natural Rizz is used, Pearto does a pair of puppy eyes to try and get her way.
You gain the following benefits at all times.
Your Charisma rating is increased by 1. You may Exert your Mind to automatically gain an Outcome of 5 on any roll that uses Charisma (Cannot be used on combat rolls or Power activations).
You also gain the following effects:
“You ever feel a sound so hard it stops a bullet? That’s what this is. I twist the knobs, drop the beat, and boom—a wall of pure rhythm locks in. It’s not just a shield. It’s the beat saying ‘not today.’ You want through? Better be louder than me.”
Exert your Mind and spend an Action. Roll Charisma + Influence at Difficulty 6.
If you succeed, you create a barrier around yourself, which absorbs the next Outcome +4 Damage. The Damage reduction from the barrier is applied before Armor. You may only have 1 active barrier at a time.
The barrier will fall after two hours, or if it absorbs the full amount of Damage. When a barrier falls, you cannot use this Effect again for a minimum of 2 Rounds.
This Effect is not obvious, and the only sign you are using an Effect is whispering Bass lines (Uzz Uzz Uzz). If someone suspects that an Effect was used, they must roll Perception + Alertness, Difficulty 8 to pick up on your Tell.
After this Effect ends, you cannot move quicker than a walk (15 feet per Round) for one minute and suffer a -1 dice penalty for an hour.
The beastmaster closes their eyes and channels nature's bloody struggle for survival. When their eyes reopen, they catch the light and glow red like a dog's. While in this heightened state, they may sense heat signatures and triangulate the tiniest sound.
Exert your Mind and spend an Action.
Your senses are enhanced in the following way. Lasts for three hours.
The doctor is a master at surgical transplantation. As long as they have a donor part, they can replace any permanent, lingering battle scars on their patient. Of course, the transplanted part doesn't always match, and the patient must be careful to follow the doctor's aftercare orders, or the replacement will be rejected.
Exert your Mind and spend a minute. Select a Living target within arm's reach. You must use up a donor body part matching the injured area in order to activate this Effect. Select a Battle Scar on your target to treat.
The treated Battle Scar heals as you finish activating this Effect. If used on a Battle Scar caused by an Unstabilized Injury, that Injury is Stabilized.
You may specify a specific condition that the patient must adhere to. If they break this condition, the treatment is immediately reversed. Record this regimen as a Condition. Lasts until the end of their next Contract or 1 month for non-Contractors.
Healing a Battle Scar in this way leaves behind a mismatched replacement on the target which cannot be healed.
By slowing the hands of one of their watches, the time-traveler may interrupt and slow a target's movement through time. The target appears to be moving in slow motion for the duration.
Exert your Mind and spend an Action. Select a Animate target within 20 feet. You must actively and obviously use a watch or clock to activate this Effect. Roll Intellect + Science at Difficulty 7.
If you succeed, the target will suffer a dice penalty equal to the Outcome for the next 2 Rounds. Dice pools may be reduced all the way down to 0 by this penalty. This breaks Concentration.
You may activate this Effect as a Reaction to contest any Action a valid target is taking, reducing their Outcome by your own. Your command has no impact beyond disrupting their Action.
The Vampire may channel their inner beast and take the form of an animal. It is said they may transform into either a wolf or a bat. If used too often, the Vampire risks losing themselves to their beast forever.
Exert your Mind and spend an Action. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. If you fail or Botch, you receive one Mind Damage and a new Trauma.
You transform into a vampire bat or a wolf until you transform into something else or choose to return to your original form. See the Extended System text for stats.
While transformed, you cannot use any equipment (including Artifacts and Consumables), and you do not have access to any of your Powers. Any equipment you are wearing transforms with you.
Injuries and Wound Level are carried over between forms. However, transforming can never kill you; you merely remain Incapacitated until your Injuries are sufficiently healed.
Possession of this Power grants the following Battle Scar: A disfigured face with bat-like ears.
True to their namesake, the hacker can penetrate the security of any computer system, granting access to its informational stores, or, in a pinch, allowing them to issue commands. The hacked system will display a flickering image of a ghost until it is dismissed.
While hacking, The Technician's fingers move with supernatural speed, blurring like a ghost.
Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.
If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.
If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.
Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.
Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.