| 1 | System Hack Detected – Security protocols detect the hack attempt. The nearest security force is alerted to your location. |
| 2 | Feedback Loop – A feedback loop causes a disorientating influx of data, you become stunned until the end of your next turn. |
| 3 | Data Corruption – The accessed system undergoes data corruption. The targeted device or system becomes unusable for 1d4 hours. |
| 4 | Signal Interference – Alien frequencies interfere with the connection, altering the data received in bizarre, unpredictable ways, resulting in misinformation or garbled communications. |
| 5 | System Overload – Your neural implant overloads, dealing psychic damage equal to your spellcasting ability modifier to you. |
| 6 | Memory Bleed – Fragments of your own memories are transferred into the system, potentially leaking sensitive information to adversaries who later access the system. |
| 7 | Ghost in the Machine – You manage to create a hidden backdoor into the system, allowing you to access it again at a later time without needing to use the RIM cybernetic. |
| 8 | Data Mining – You access a wealth of information, obtaining a secret or valuable piece of data that grants you advantage on your next Intelligence or Wisdom check related to the obtained data. |
| 9 | Alien Intrusion – The alien presence in the tech network notices your intrusion, taking a mysterious interest in you. You feel a strange presence in your mind, witnessing bizarre visions for a short duration. |
| 10 | Technological Harmony – For a moment, all tech devices in a 30-foot radius sync harmoniously with your neural network, granting you a brief, lucid understanding of their operations and functions, possibly revealing hidden functionalities or data. |
Created for Dungeon Masters and Game Masters, World Anvil has everything you need to build your own homebrew RPG campaign setting, and run your games, either online or around the table!
Take the first step. Create your account. Your world and characters await!