3.5 KiB
3.5 KiB
{{Location Name}}
Basic Info
- Type: (Corporate facility, Slums, Underground, Space station, etc.)
- Size: (Small, Medium, Large, Massive)
- Control: (Corporate, Independent, Contested, Abandoned)
- Security Level: (Public, Restricted, High Security, Black Site)
Description
- Visual Style:
- Atmosphere: (Sterile corporate, Gritty underground, Decaying, High-tech)
- Key Features:
- Lighting/Mood:
- Sounds/Ambience:
Layout
- Main Areas:
- Entry/Exit Points:
- Hidden Areas:
- Verticality: (Single level, Multi-floor, Massive structure)
Control & Access
Who Runs It
- Primary Faction:
- Secondary Presence:
- Neutral Zones:
Security Measures
- Surveillance:
- Access Control:
- Guards/Patrols:
- Automated Defenses:
Access Methods
- Official Entry:
- Service Entrances:
- Hidden Routes:
- Augmentation Shortcuts:
Inhabitants
- Key NPCs: Character 1, Character 2
- General Population:
- Security Personnel:
- Unique Individuals:
Gameplay Elements
Stealth Opportunities
- Cover Points:
- Ventilation/Maintenance:
- Crowd Blending:
- Shadow Areas:
Combat Considerations
- Chokepoints:
- Open Areas:
- Environmental Hazards:
- Escape Routes:
Hacking/Tech
- Network Access Points:
- Security Systems:
- Data Terminals:
- Augmentation Interfaces:
Social Interactions
- Safe Conversation Zones:
- Information Sources:
- Trade Opportunities:
- Faction Representatives:
Story Integration
- Narrative Purpose:
- Key Events Here:
- Character Development:
- Player Choices Impact:
Quests & Activities
Items & Resources
- Loot Available:
- Shops/Vendors:
- Crafting Materials:
- Unique Items: Item Name
Dark Sci-Fi Elements
Corporate Presence
- Corporate branding:
- Surveillance implications:
- Worker conditions:
- Propaganda/messaging:
Social Divide
- Class separation:
- Access inequality:
- Living conditions:
- Underground economy:
Technology Impact
- Augmentation requirements:
- Tech dependencies:
- System failures:
- Digital vs analog spaces:
Multiple Approaches
High-Profile Path
- Official channels:
- Corporate credentials:
- Higher scrutiny:
Stealth Path
- Hidden routes:
- Avoiding detection:
- Maintenance access:
Social Path
- Networking:
- Information gathering:
- Relationship leverage:
Force Path
- Direct confrontation:
- Security response:
- Collateral damage:
Connections
- Adjacent Locations: Location 1, Location 2
- Transportation Links:
- Communication Networks:
- Supply Lines:
Environmental Storytelling
- Visual Clues:
- Hidden Messages:
- Abandoned Areas:
- Corporate Propaganda:
Technical Notes
- Performance Considerations:
- Lighting Requirements:
- Audio Zones:
- Interactive Elements:
Tags: #location #[faction-control] #[seclevel-0/1/2/3] Access Methods: #[stealth/combat/social/hacking/exploration] Priority: #[critical/important/optional/flavor] Status: #[concept/draft/implementing/complete/cut]