RULES Program & Daemon Creation Template

Administrator
Eddies
986

Program & Daemon Creation Template




REFERENCE - BALANCING CHART

TypeCost (Eddies)EffectivenessComplexity LevelLimitationsScope
Utility Program500 - 2,000Unlocks or enhances basic systemsLow to MediumLimited to one action per useSingle target or small networks
Defensive Program1,000 - 5,000Shields or repairs cyber systemsMedium to HighSlower activation, high RAM usageMultiple systems or self-defense
Offensive Program2,000 - 8,000Damages ICE or netrunnersMedium to HighHigh RAM use, easy to detectSingle or multiple ICE targets
Black ICE Daemon10,000+Lethal to netrunners, autonomousHigh to ExperimentalSelf-destructive, limited runsEntire networks or critical systems
Hybrid Program5,000 - 15,000Combines multiple functionsHigh to ExperimentalProne to failure, high upkeepVariable (depends on design)
Data Fortress50,000+Full control over a network hubExperimentalImmovable, expensive, vulnerableEntire local or regional networks
Encryption Program2,000 - 5,000Protects data with advanced encodingMediumSlows down authorized accessSmall or medium-sized networks
Decryption Program3,000 - 7,000Breaks through encoded dataMedium to HighTime-intensive, high detection riskSingle file or connected systems
Spy Daemon4,000 - 8,000Monitors or records activitiesMediumCan be traced if left too longSingle or multiple nodes
Cloaking Program5,000 - 10,000Hides presence of netrunnersMedium to HighLimited duration, drains resourcesLocalized networks
Recon Daemon3,000 - 6,000Maps out network architectureLow to MediumLimited by complexity of networkEntire connected systems
Trap Daemon8,000+Sets automated countermeasuresHighVulnerable to decryption programsSingle point or node
Combat Program6,000 - 12,000Directly engages intrudersHighHigh resource demand, noticeable delaySingle or multiple targets
Virus Program10,000+Corrupts or disables systemsHigh to ExperimentalHard to control spread, potential recoilEntire network
Firewall Booster5,000 - 10,000Temporarily strengthens defensesMediumShort-lived, costly to maintainLocalized or regional networks
Net Launcher Daemon8,000+Traps netrunners in localized areasHighRisk of entangling alliesSpecific user nodes
Honeypot Program7,000 - 15,000Lures attackers into false systemsHigh to ExperimentalRequires advanced programmingDecoy or false nodes
Adaptive ICE12,000+Reacts to intruders with learning AIExperimentalExtremely expensive, hard to upgradeEntire networks or high-security hubs
Resource Leech4,000 - 9,000Drains processing power or RAMMedium to HighSlow to activate, detectableIndividual targets
Emergency Reset3,000 - 8,000Resets compromised systemsMediumLeaves system vulnerable temporarilySingle or small clusters
Skill Enhancement6,000 - 12,000Temporarily boosts netrunning skillsMedium to HighLimited to short durationsNetrunner-focused
Signal Jammer4,000 - 8,000Blocks communication between nodesMediumLimited range, can be counteredLocalized systems
Proxy Shield6,000 - 11,000Masks the source of an attackMedium to HighCan fail against advanced tracingEntire regional systems
Neural Feedback ICE15,000+Causes physical harm to intrudersExperimentalRisk of collateral damageIndividual or small connected systems
Replication Virus20,000+Multiplies itself across networksExperimentalHard to contain once activatedEntire system ecosystems



GENERAL OOC INFORMATION

  • Image Source: (Provide a link to any images used for your submission, with credit to the creator or original source if possible.)

PROGRAM/DAEMON INFORMATION

  • Name: (What is the name of your Program or Daemon?)
  • Type: (Program or Daemon? Specify if it's Black ICE, Utility, Offensive, Defensive, or a Hybrid.)
  • Functionality: (Briefly describe what the Program/Daemon is designed to do. Examples: Hacking, data extraction, net combat, etc.)
  • Complexity Level: (Rate how advanced the Program/Daemon is: Low, Medium, High, or Experimental.)
  • Cost (Eddies): (What does it cost to acquire or develop?)
  • Availability: (Common? Limited? Rare? Unique?)
  • Activation Requirements: (What is required to run it? Specify cyberdeck power, skill level, or special conditions.)
  • Scope of Impact: (Does it target a single device, multiple systems, or entire networks?)

PROGRAM/DAEMON DESCRIPTION

  • Primary Effect: (Detail the main ability or function. Example: Black ICE may deal damage to intruders, a utility may unlock encrypted files, etc.)
  • Secondary Features: (Optional: List any secondary or bonus effects.)
  • Visual/Aesthetic: (How does the Program/Daemon appear on a netrunner's interface or in cyberspace?)
  • Limitations: (What are the drawbacks or conditions that limit its use? Examples: High resource usage, potential self-destruction, etc.)
  • Countermeasures: (What can stop or counteract this Program/Daemon? Example: Specialized ICE, high-level security protocols.)

RATIONALE AND FUNCTION

  • Design Intent: (Why was this Program/Daemon created? What purpose does it serve, and what gap does it fill?)
  • Impact on Netrunning: (How does it affect gameplay, roleplay dynamics, or netrunning mechanics?)
  • Risk vs. Reward: (What are the stakes when using this Program/Daemon? Is the reward worth the potential risk?)
  • Upgrade Paths: (Can this Program/Daemon be enhanced or modified over time? How?)
  • Special Features: (Does it offer any unique interactions, rare benefits, or lore-based applications?)
  • Potential Uses in Roleplay: (Describe how this Program/Daemon could shape interactions or scenarios.)


.
 
Back
Top