116 lines
2.5 KiB
Markdown
116 lines
2.5 KiB
Markdown
# {{System Name}}
|
|
|
|
## Basic Info
|
|
- **System Type:** (Combat, Hacking, Stealth, Augmentation, Social, etc.)
|
|
- **Core Purpose:**
|
|
- **Player Interaction:** (Active/Passive/Both)
|
|
- **Complexity:** (Simple/Medium/Complex)
|
|
|
|
## How It Works
|
|
- **Basic Function:**
|
|
- **Player Input:**
|
|
- **System Response:**
|
|
- **Key Resources:** (Energy, Credits, Data, etc.)
|
|
|
|
## Core Mechanics
|
|
### Primary Actions
|
|
-
|
|
-
|
|
-
|
|
|
|
### Success/Failure
|
|
- **Success conditions:**
|
|
- **Failure consequences:**
|
|
- **Partial success:**
|
|
|
|
### Limitations
|
|
- **What blocks players:**
|
|
- **Resource costs:**
|
|
- **Cooldowns/restrictions:**
|
|
|
|
## Player Progression
|
|
- **How to improve:**
|
|
- **Upgrades available:**
|
|
- **Augmentation integration:**
|
|
- **Skill unlocks:**
|
|
|
|
## Integration
|
|
### Story Impact
|
|
- **Narrative purpose:**
|
|
- **Character development:**
|
|
|
|
### Other Systems
|
|
- **Works with:** [[System 1]], [[System 2]]
|
|
- **Conflicts with:**
|
|
- **Enhanced by:**
|
|
|
|
### Environmental Use
|
|
- **Key locations:** [[Location 1]], [[Location 2]]
|
|
- **Faction differences:**
|
|
- **Corporate vs Underground:**
|
|
|
|
## Player Experience
|
|
- **Learning curve:**
|
|
- **Mastery goals:**
|
|
- **Emotional payoff:**
|
|
- **Risk/reward balance:**
|
|
|
|
## Dark Sci-Fi Elements
|
|
### Corporate Control
|
|
- **How corps limit this:**
|
|
- **Black market alternatives:**
|
|
- **Surveillance implications:**
|
|
|
|
### Moral Choices
|
|
- **Ethical dilemmas:**
|
|
- **Unintended consequences:**
|
|
- **Gray area decisions:**
|
|
|
|
### Technology Impact
|
|
- **Augmentation requirements:**
|
|
- **Tech dependencies:**
|
|
- **System vulnerabilities:**
|
|
|
|
## Multiple Approaches
|
|
### High-Tech Path
|
|
- **Augmented abilities:**
|
|
- **Corporate tools:**
|
|
- **Advanced options:**
|
|
|
|
### Low-Tech Path
|
|
- **Analog methods:**
|
|
- **Underground techniques:**
|
|
- **Creative solutions:**
|
|
|
|
### Social Path
|
|
- **Information gathering:**
|
|
- **Manipulation options:**
|
|
- **Relationship leverage:**
|
|
|
|
## Balance & Exploits
|
|
- **Potential exploits:**
|
|
- **Safeguards:**
|
|
- **Difficulty scaling:**
|
|
- **Player choice respect:**
|
|
|
|
## Technical Notes
|
|
- **Implementation needs:**
|
|
- **UI requirements:**
|
|
- **Performance considerations:**
|
|
- **Player feedback systems:**
|
|
|
|
## Examples
|
|
### Typical Use Case
|
|
- **Situation:**
|
|
- **Player action:**
|
|
- **System response:**
|
|
|
|
### Edge Case
|
|
- **Unusual scenario:**
|
|
- **System behavior:**
|
|
|
|
---
|
|
**Tags:** #system #[stealth/combat/social/hacking/exploration]
|
|
**Tech Integration:** #[low-tech/high-tech/cutting-edge/experimental]
|
|
**Priority:** #[critical/important/optional/flavor]
|
|
**Status:** #[concept/draft/implementing/complete/cut] |