Difference between revisions of "SR5:Matrix Rules"

From Shadowrun Wiki
Jump to: navigation, search
Line 59: Line 59:
 
|Jump Into Rigged Device||Misc||[[SR5:Matrix:Skills/Attributes#Electronic_Warfare|Electronic Warfare]] + Logic vs Willpower + [[SR5:Matrix:Skills/Attributes#Firewall|Firewall]]||Data Processing||3
 
|Jump Into Rigged Device||Misc||[[SR5:Matrix:Skills/Attributes#Electronic_Warfare|Electronic Warfare]] + Logic vs Willpower + [[SR5:Matrix:Skills/Attributes#Firewall|Firewall]]||Data Processing||3
 
|-
 
|-
|Matrix Perception||Information Gathering||||Data Processing||None
+
|Matrix Perception||Information Gathering||[[SR5:Matrix:Skills/Attributes#Computer|Computer]] + Intuition (vs. Logic + [[SR5:Matrix:Skills/Attributes#Sleaze|Sleaze]] if [[SR5:Matrix:Actions|Running Silent]])||Data Processing||None
 
|-
 
|-
 
|Reboot Device||Device Manipulation||||Data Processing||3
 
|Reboot Device||Device Manipulation||||Data Processing||3

Revision as of 17:29, 26 April 2017

5th Edition Rules
Basics // Combat // Magic // Matrix // Driving // Character Creation
Basics Skills/Attributes Actions Jargon Cyberdecks Programs How To Complex Forms Echoes Sprites Sprite Powers IC
FREE ACTIONS
ACTION
Load Program
Switch Two Matrix Attributes
Swap Two Programs
Unload Program
COMPLEX ACTIONS
ACTION FUNCTION TEST LIMIT MARKS
Brute Force Mark Manipulation Cybercombat + Logic vs. Willpower + Firewall Attack None
Check Overwatch Score Information Gathering Electronic Warfare + Logic Sleaze None
Crack File File Manipulation Hacking + Logic vs. 2 * Protection Rating Attack 1
Crash Program Matrix Combat Cybercombat + Logic vs. Intuition + Firewall Attack 1
Data Spike Matrix Combat Cybercombat + Logic vs. Intuition + Firewall Attack None
Disarm Data Bomb File Manipulation Software + Intuition vs. 2 * Data Bomb Rating Firewall None
Edit File File Manipulation Computer + Logic vs. Intuition + Firewall Data Processing 1
Enter/Exit Host Misc Data Processing 1
Erase Mark Mark Manipulation Cybercombat + Logic vs. Willpower + Firewall Attack Special
Erase Matrix Signature Mark Manipulation Computer + Resonance vs. 2 * Signature Rating Attack None
Format Device Device Manipulation Computer + Logic vs. Willpower + Firewall Sleaze 3
Grid-Hop Misc Data Processing None
Hack on the Fly Mark Manipulation Hacking + Logic vs. Intuition + Firewall Sleaze None
Hide Misc Electronic Warfare + Intuition vs Intuition + Data Processing Sleaze 0
Jam Signals Misc Electronic Warfare + Logic Attack Owner
Jump Into Rigged Device Misc Electronic Warfare + Logic vs Willpower + Firewall Data Processing 3
Matrix Perception Information Gathering Computer + Intuition (vs. Logic + Sleaze if Running Silent) Data Processing None
Reboot Device Device Manipulation Data Processing 3
Set Data Bomb File Manipulation Sleaze 1
Snoop Information Gathering Sleaze 1
Spoof Command Device Manipulation Sleaze 1
Trace Icon Information Gathering Data Processing 2
VARIABLE ACTIONS
ACTION FUNCTION LIMIT MARKS
Control Device Device Manipulation Data Processing* Varies
Matrix Search Information Gathering Data Processing Special
*Control Device may or may not use Data
Processing as its limit
SIMPLE ACTIONS
ACTION FUNCTION LIMIT MARKS
Change Icon Misc Data Processing Owner
Jack Out Misc Firewall Owner
Invite Mark Mark Manipulation Data Processing Owner
Send Message Misc Data Processing 1
Switch Interface Mode Misc Data Processing Owner
INTERRUPT ACTIONS
ACTION FUNCTION LIMIT INIT COST MARKS
Full Matrix Defense Matrix Combat Firewall -10 Owner

Technomancer Actions

SIMPLE ACTIONS
ACTION
Call/Dismiss Sprite
Command Sprite
COMPLEX ACTIONS
ACTION
Compile Sprite
Decompile Sprite
Erase Resonance Signature
Kill Complex Form
Register Sprite
Thread Complex Form