Spyware Design

Boldness
Empathy
Reasoning

Short Description

Design and utilise - or counter - hostile surveillance and tracking software, infecting both computers, gadgets and even tech modules.

Success Criteria

Roll d100 + skill bonus vs. DR 100

Effects

Plant software in a target unit, enabling you to track it and monitor its functions. The Spyware Design skill can also be used to set up firewalls or similar to protect devices and tech modules.

If you have successfully infected a device you can track it and monitor its use. You gain a +20 bonus to defend against any tracked tech module.

For every 2 ranks in this skill you gain a free rank in the Hacking skill.

Modifiers and Restrictions

+20 DR for military or heavy duty security software

+10 DR under time pressure (in battle situations)

-20 DR against unsuspecting or friendly targets

-10 DR against inferior technology

When targeting tech modules modify DR with target's Resilience bonus + Tech Category Bonus.

Action Examples

While your envoy colleague is negotiating with Themis the Cybermancer, you infect his Cybernetics-module enabling you to track him and counter his Claw Implant attacks (since you know exactly when they're coming) with +20. Roll d100 + skill bonus against DR 100 + resilience bonus + Themis' cybernetics category bonus.

You plant a trojan horse surveillance malware in a clan comrades computer - enabling you to physically track his movements. DR 80 (100 -20 for friendly target).

Long Description

The Design Spyware skill represents a character’s expertise in creating, deploying, and countering advanced surveillance and tracking software. This skill is not merely about writing code—it’s about understanding the intricate dance of infiltration, deception, and digital warfare. Characters proficient in this skill can craft malicious software capable of infiltrating secure systems, monitoring targets undetected, and extracting or manipulating data. They can also design countermeasures to detect, neutralize, or even reverse-engineer hostile spyware deployed by adversaries.

A master of Design Spyware knows how to exploit vulnerabilities in both hardware and software, tailoring their creations to specific targets—whether it’s a corporate mainframe, a personal gadget, or even the tech modules embedded in cybernetic implants. They understand the importance of stealth, ensuring their software operates silently, evading detection by firewalls, intrusion detection systems, and even skilled cybersecurity professionals.

Beyond creation, they can also analyze and dismantle enemy spyware, turning the tables on those who seek to monitor or sabotage their allies.

Sequencing

May be sequenced with for example Pick Pockets, Sleight of Hands, Eavesdrop or even a Hide skill. Makes for good Signature Moves.

Potential Counters

Spyware Design as well as Hacking - reversed - can be used to counter Spyware Design. Roll opposed skill rolls.

How to use this page

All the information above is intended as a guide to help you navigate the many situations that can arise during your game. Since it's both impossible—and frankly uninspiring—to plan for every possible outcome, players are encouraged to think creatively when using their skills. Game Masters, in turn, are encouraged to embrace and support that creativity.

Whenever possible, aim to resolve situations through narrative choices, logical thinking and role playing. If that’s not feasible, agree on a Difficulty Rating (DR) using the provided Success Criteria and Modifiers. These are not rigid rules, but suggestions - starting points to help you find the right level of challenge. The player describes their intended action, and the Game Master proposes a DR. This should be open to brief discussion at the table, ideally resulting in consensus. If not, the Game Master has the final say.

It’s important to emphasize that all suggested effects, modifiers, and action examples are exactly that: suggestions. If you’re unsure how to resolve something, they offer a reliable fallback—but wherever possible, we encourage you to push boundaries. That’s where some of the most memorable and exciting moments in play are born.

Sequencing and Potential Counters are far from exhaustive. With hundreds of skills, spells, and tech modules in the game, the possibilities are too vast to list. You’re encouraged to explore combinations that make sense in your story and setting and in the situations that arise in your game. Sequencing and countering are core to Cosmic Odyssey - they’re where strategic depth meets dramatic flair, and where legendary moments often take shape. Even if no sequencing and counters are mentioned, some certainly exists and can be smartly utilized.

So explore boldly, improvise wisely, and enjoy the game as it unfolds around your choices.