Level 5 [Experiment]
Target Computer network
Pull Time Action
Components Security tools
For the duration, anyone attempting to bypass the target computer’s security (other than you) automatically fails to do so and must succeed in a Dexterity save or take 4d6 lightning damage.
HYPERLANES Developer Ryan Chaddock Copyright 2017 Scrivened, LLC