Beep boop boom

4
The power to issue commands to technological devices.
Used by (Francisco) Lou, Created by mmmsquid.
(Anyone who witnesses you activate this Effect is very likely to be disturbed to see If the device is self destructed, the hardware will begin emitting a multi-coloured boiling goop.. You must actively and obviously be using Silly little rubber band.)

Nice computer you have there. Would be a shame if something happened to it.


Exert your Mind and spend 2 Actions. Select a Device within 20 feet. Can be used on Alien technology. You must actively and obviously use Silly little rubber band to activate this Effect. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Your hack cannot be discovered by system administrators or firewall software for a number of hours equal to your Outcome on the initial roll.

Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see If the device is self destructed, the hardware will begin emitting a multi-coloured boiling goop..

After you finish activating this Effect, you cannot move quicker than a walk (max 15 feet per Round) for one minute and suffer a -1 dice penalty for an hour. Exhaustion’s penalty and duration stacks with multiple activations.

Possession of this Power grants the following Trauma at all times: Must roll Self Control to avoid using this ability on any system which allow another being to be contained, such as cage locks or shipping containers..

  • When narrating disturbing content, be cognizant of your group's tone and accommodating to those who would like to "fast forward" through the description.
  • Exhaustion penalties and duration stack. If you activate this Effect or another Effect with Exhaustion, your penalty will worsen, and the duration is increased by one hour.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Community Hack Gifts

Exert your Mind and spend 2 Actions. Select a Device within 300 feet. Can be used on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Possession of this Power grants the following Trauma at all times: Anti-Social.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Everything has mana, each has a specific unique frequency in sapiens mana is their soul everything reveals themselves in their mana wether they know it or not.

Increase your sacrificial Injury's Severity by 1 and spend 2 Actions. Investigate an area with a radius of up to 100 feet You must actively and obviously use staff, stave, wand. to activate this Effect. At the end of your investigation, roll Intellect + Occult at Difficulty 6.

You learn the following information about the area:

  • You learn where exactly creatures and people live within the area, and what sorts of creatures they are.
  • You learn You detect any areas of social/cultural importance or significance (heritage sites, memorials, ritual sites)
The quality and specificity of information gained depends on your Outcome.

If you do not have a sacrificial Injury when you activate this Effect, take a new Severity-1 Injury.

You cannot investigate the same area more than once per day.

  • The sacrificial Injury received from activating this Effect cannot be prevented by any means or healed before 1 day has passed. It is shared with all Effects that use sacrifice. This Injury does not requires Stabilization or cause Battle Scars when it becomes Severe.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Use up this Charm and spend 2 Actions to activate. Select a Computer within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6. The hacking roll and their defensive roll are both Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind A tree with a pentagram on the trunk in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • This consumable is destroyed when used and cannot be used again.
  • You can target yourself if you qualify as a valid target by the other requirements.

Increase your sacrificial Injury's Severity by 1 and spend 1 minute. Select a Device within 20 feet. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

You may issue a "self-destruct" command that leaves the hacked system's hardware inoperable, even if that machine had no such functionality previously. Only works on Computers.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind Fractal Spiders crawl across the screen/device in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see You vomit a stream of fractal spiders onto the device.

If you do not have a sacrificial Injury when you activate this Effect, take a new Severity-1 Injury.

  • When narrating disturbing content, be cognizant of your group's tone and accommodating to those who would like to "fast forward" through the description.
  • The sacrificial Injury received from activating this Effect cannot be prevented by any means or healed before 1 day has passed. It is shared with all Effects that use sacrifice. This Injury does not requires Stabilization or cause Battle Scars when it becomes Severe.
  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Exert your Mind and spend 2 Actions. Select a Device within 20 feet. Can be used on Alien technology. You must make a Trauma roll when you use this Effect. Its Difficulty cannot be reduced by any means. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

After successfully using this Effect, you may choose to add the target to your own personal "network." You may use this Effect on any target on your network at any range. You can have up to 3 targets on your network.

When targeting non-computer devices, you may operate switches, buttons, dials, levers, and latches.

Every hack you make leaves behind The device’s screen flashes only purple and green ‘Dingbat’ font. in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

Anyone who witnesses you during this Effect's activation will almost certainly be disturbed to see Dingbat’s eyes reflect static, or a strange looking digitalised heartbeat. perhaps it’s his own..

  • When narrating disturbing content, be cognizant of your group's tone and accommodating to those who would like to "fast forward" through the description.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.

Stock Hack Gifts

Exert your Mind and spend 1 minute. Select a Computer within arm's reach. Does not work on Alien technology. Roll Intellect + Technology, with the Difficulty set by the GM depending on the security of the system you are hacking. Sapient targets can resist by rolling Mind at Difficulty 6.

If you succeed, you may issue a single command to the targeted system. This command must have a specific outcome or be a request for specific login credentials. The command you issue must be within the machine's current capabilities. For example, you cannot order a standard security camera to grow legs and walk around.

If your command does not require bypassing the security of the target (for example, typing on a computer that is unlocked), you do not need to Exert your Mind to activate this Effect, and activation only takes a single Action.

Your Hack cannot be reversed through mundane means for a number of hours equal to your Outcome.

Every hack you make leaves behind a flickering image of a ghost in the system as a personal "calling card" that informs anyone who uses the system that the hack occurred.

  • You cannot hack things outside of your range over remote connections such as the internet. The system you are affecting must be physically within range.
  • You can target yourself if you qualify as a valid target by the other requirements.
  • Your target must be within line of sight, or within range of another sense if more fitting for the Gift's flavor.