The Slicer


Wherever there is technology, there will be those trained to subvert it. Slicers are masters of hacking computers, recovering hidden documents, bypassing security, and even turning electronic systems against their former operators. They are swift ghosts in the machine, disappearing once their technological mission is accomplished.


When you choose this archetype at 1st level, you learn the specific codes of hacking into computers and terminals. You become profiecient in a special ability called Slice (Intelligence). This special ability counts as a Tool and lets you work your way into networks and bypass firewalls to access restricted areas of a computer. 

Your slice DC: 8 + proficiency bonus + slice bonus

Knack: Computer Mastery

When you choose this archetype at 1st level, you improve on your ability to gain control of computers and other devices. When you make a Slicer's or Intelligence (Use Computer) check to access a computer system, you may roll your Knack dice and add the result to the check. Likewise, if another creature is attempting to regain or take control of a computer system you currently control you may make a Slice check, opposed by their Intelligence (Use Computer) check, you may roll your Knack dice and add the result to the your check. This increases as you gain levels in the Specialist class, as listed in the Knack column of the Specialist class table.


Starting at 3rd level, you can add double your proficiency bonus to any ability checks made with Slice. In addition, you can issue any commands that you have that take 10 minutes or less as an action but it is unsecure, during this process it informs any network security to the presence of a slicer. Any person that has access to the same network can use its Reaction to make an opposed Use Computer (Intelligence) check to prevent you from slicing.


When you reach 3rd level, your quick calculations help you avoid attacks by judging the location of where the attack might hit. When an attack you can see would hit you, you can use your reaction to add your Intelligence modifier to your AC effectively making the attack miss. You can use this feature a number of times equal to your Intelligence modifier before having to take a short or long rest to regain all uses. 


Starting at 9th level, you can completely shut down electronic systems and networks. You can make a Slice check as an Action when physically adjacent or connected to a computer terminal, the DC of which is determined by the DM based on the difficulty of the situation. On a success, the terminal and any electronic computer systems directly connected to it become inactive and shut down. This includes lights, doors, security systems, and networked computers. This shutdown lasts for 1 minute per Specialist level you possess, despite any attempts to restore it by anyone but you. You can attempt to use this feature a number of times equal to your Intelligence modifier - whether you succeed or not. You regain all uses of this feature when you take a long rest.

HoloNet Spectre

At 13th level, you become a virtual ghost. When accessing a computer system, you only alert opposing forces to your attempts if you happen to roll a Natural 1 on using your Slice. Otherwise you are undetectable unless someone physically sees you.

Hack The Planet

Starting at 17th level, your "Blackout" feature now permanently shuts down an electronic system unless restored with a Mechanics check versus your Slicing save DC. 

Additionally, you can open up your network to other Slicers who consider you an ally. You can have a number of allied Slicer's assist you up to your Intelligence modifier. These must be allies you made ahead of time as well as notified them of when your attempting to Slice. They must also have the ability to connect to your network (ie datapad, HoloNet, nearby Terminal). When you do, your save DC is increased by 5 for your current slicing task for each allied Slicer. Once you use this feature you cant do so again until you finish a long rest.

Slicer Computer Commands

These can only be used by the Slicer class and usually have a required amount of time to perform. If an opposing check would need to be made, use the opposing network security detail modifiers. The average network security modifier to checks is a +4. When dealing with network security that is hired by wealthier individuals you can increase their modifier. If dealing with a counter slicer or another slicer the average modifier is a +8. 

Improve Access

You can attempt to improve your access into the computer you are slicing, to make your end goal easier and less harrowing as you break down its firewalls. Doing so takes 10 minutes, and you initiate a skill challenge. You make a Slice check to attempt to break down some of the computers firewalls, mitigate through various computer files or the like and try to adjust the DC of a computer in order to gain access to its programs and information. You must be able to communicate with the computer either through a direct interface (such as a terminal), or by connecting to it through an appropriate network (such as the holonet).
If your check equals or exceeds the computers opposed check, the DC for your final check and true goal will shift in your favor, causing it to decrease by 5. If you fail, the DC remains unchanged.
if you fail by 5 or more, the computer notifies a computer administrator of the access attempt.
It will trace your exact location and notify the nearest security personnel.
In addition, if you fail by 5 or more when attempting to improve access, it isolates your connection and rejects any further attempts and locks you out for 24 hours.

Reprogram Droid

As an action, you can make a Slice check to reprogram a Droid that is connected to the computer to obey a new master; copy data stored in its memory banks, change its programming, erase memories selectively, or erase it entirely. (resetting it to its factory status). the Droid can make a Intelligence (Mechanics) check contested against your Slicers' kit check. Should the check fail; that Droid becomes hostile. Reprogramming a Droid takes 10 minutes.


You can spend 10 minutes attempting to breakdown and understand the firewalls of the computer system. In doing so, you can find any passwords used on this terminal and any passwords or security codes that have been saved to this network in files, emails or other documents. These may grant passwords and security codes to other terminals, doors or droids that have secure access panels. 

Control System

Spending 10 minutes to slice into the security system you can gain access to security subsystems such as cameras, turrets and alarms. When you do, you can take control over these subsystems in terms of how they operate. 

Change Program

As an action, as long as you have control over the system, you can alter the program of a system you have control over. These are minor changes such as moving a camera to watch a seperate section, adjusting turrets enemy designation etc.