Illegally gain access to secured systems, bypassing firewalls, locks, alarms, surveillance, and other protective protocols without leaving a trace.
Roll 1d100 + System Bypass skill vs. DR 100 + the security system’s level or threat rating
If successful, you gain access to the secured system or bypass the protective measure (door, camera, AI gate, etc.) without triggering alarms or traces.
On failure, security may escalate, log your attempt, or activate defensive countermeasures (at GM discretion).
+10 to +60 DR on complex systems (multi-layered encryption, AI defense, adaptive locks)
-10 to -30 on simple system.
–10 to –30 DR if the user has insider knowledge, physical access, or a backdoor
+10 DR if system has been recently updated or rerouted
+20 DR if performed while under pressure (combat, countdowns, alerts)
Bypassing a biometric door lock in a corporate lab: DR = 100 + 30 (complex multi-check system) = 130
Roll = 142 → SR = 12→ Access granted; logs wiped. No alert triggered.
Disabling motion sensors via a concealed terminal:
DR = 100 – 20 (has blueprint) – 10 (old system) = 70
Roll = 105 → SR = 35→ Sensors disabled cleanly. Team proceeds undetected.
System Bypass is the rogue’s answer to modern security. It involves slicing through digital locks, fooling surveillance software, disrupting alarm protocols, and exploiting backdoors to access restricted areas or data. Success depends on your knowledge of system architecture, your reflexes under pressure, and your ability to think creatively under the radar.
Whether sneaking through a research station, infiltrating a criminal databank, or disabling a sentry network, System Bypass allows you to act fast and quiet - usually with no one ever knowing you were there. The more complex the system, the greater the risk and reward. But the best thieves never trip an alarm, and never leave a trace.
...
...