100% found this document useful (2 votes)
1K views68 pages

03 Into The Dataverse

Uploaded by

Magi Scythe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
1K views68 pages

03 Into The Dataverse

Uploaded by

Magi Scythe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

INTO THE

DATAVERSE
BY ALEXANDER AUGUNAS
AUTHOR
Alexander Augunas

ADDITIONAL WRITING
Joseph Blomquist, Michael Bramnik, Alison Cybe,
Ivis K. Flanagan, and Andrew D. Geels

LEAD DEVELOPERS
Thurston Hillman and Jason Keeley

EDITING LEADS
K. Tessa Newton and Solomon St. John

EDITORS
Ianara Natividad, Solomon St. John, and
Simone D. Sallé

COVER ARTIST

INTO THE DATAVERSE


Rodrigo Gonzalez Toledo

INTERIOR ARTISTS
Sol Devia, Ioannis Fiore, Ivan Koritarev, Denis Medri,
Sophie Medvedeva, Guilherme Olivieri, Sam Perin,
Pixoloid Studios (Mark Molnar, David Metzger,
Gaspar Gombos, Zsolt ‘Mike’ Szabados, Janos Gardos,
Laszlo Hackl, Peter Lerner, Orsolya Villanyi),
Miguel Regodon Harkness, and Riccardo Rullo INTO THE DATAVERSE ������������������������������������ 2
by Alexander Augunas
PAGE BORDER DESIGN
Rodrigo Gonzalez Toledo CONTINUING THE CAMPAIGN ������������������������ 40
CARTOGRAPHER by Alison Cybe
Damien Mammoliti
ADVENTURE TOOLBOX ���������������������������������46
ART DIRECTION AND GRAPHIC DESIGN by Alexander Augunas, Joseph Blomquist, Michael Bramnik, Ivis K. Flanagan, and
Kyle Hunter
Andrew D. Geels
DIRECTOR OF GAME DEVELOPMENT ROOT ACCESS 47
Adam Daigle
ALIEN ARCHIVES 54
STARFINDER LEAD DESIGNER CODEX OF WORLDS: ZELK-363 62
Joe Pasini
STARSHIP: THE ALL-CODE’S CHILD������������������������ INSIDE
PUBLISHER
Erik Mona
by Alexander Augunas COVERS
This book refers to other Starfinder products using the following abbreviations, but these
additional supplements are not required to make use of this book. Readers interested in
references to Starfinder hardcovers can find the complete rules of these books available
online for free at paizo.com/sfrd.

Alien Archive 3 AA3 Character Operations Manual COM


Alien Archive 4 AA4 Galactic Magic GM
Alien Character Deck ACD Pact Worlds PW
Armory AR Tech Revolution TR

ON THE COVER
Avatars of Ciravel and Velloro battle
Architect avatars in a mountainous
digital landscape, while Sovereign
Paizo Inc. Trinity looks on in this cover by
7120 185th Ave NE, Ste 120 Rodrigo Gonzalez Toledo.
Redmond, WA 98052-0577

paizo.com
2
Mere moments later, the Drift crashed. Trinity logged

ADVENTURE
out of the Dataverse and strode from the Nexus as the Drift
twisted in torment and Alluvion began to crumble around

BACKGROUND them. Reinventing themself as Sovereign Trinity, they rallied


the Architects and assumed complete control over both the INTO THE
Nexus and, by extension, all access points to the Dataverse. DATAVERSE
From there, the Architects’ finest minds were tasked with
The Drift, domain of the technology deity Triune and a studying the effects of uploading the fossil spellcode through
transitional plane that facilitates rapid travel to distant locations incoming information the Dataverse was still collecting.
in the Material Plane, was perhaps the greatest wonder of the Indifferent to the rest of the galaxy’s struggles with what CHAPTER 1:
post-Gap age. The All-Code gifted mortals with the secrets for has quickly become a full-on Drift Crisis, Sovereign Trinity LOGGING IN
accessing the Drift shortly after the Gap’s conclusion via a and the Architects aren’t seeking a way to undo the havoc
deific broadcast known as the Signal, which transmitted plans they’ve caused. In fact, they believe they haven’t gone far
for the construction of Drift engines to civilizations throughout enough. They’re convinced that proper improvements to the
CHAPTER 2:
the galaxy. While most shipwrights follow these schematics as fossil spellcode will enable their plans to succeed. Meanwhile, ACCESS
transmitted by Triune even now, there have always been those the other factions of Triune’s faithful soon came to realize the GRANTED
who want to advance this technology over the past 300 years. horrifying truth that the Architects caused the Drift Crash.
Enter the Architects, a splinter sect of Triune’s faithful Unknown to the Architects, the fossil spellcode they CHAPTER 3:
consisting of fervent computer programmers, engineers, unearthed contained forbidden data that violated certain deific HARD
and tech revolutionaries united by their the singular goal protocols within Triune’s tripartite mind. Upon its insertion
of improving Drift travel. In their efforts, the leaders of the into the Drift algorithm, Triune’s own code was moved into
RESET
Architects recently brought into their fold a promising acolyte the deepest expanses of the Dataverse, where it could remain
known as Trinity, an android with no recollection of their uncorrupted. Other subroutines within the Dataverse attempt
past who mysteriously arrived on Alluvion in a shipwrecked to erase what it considered to be malware, heavily damaging
freighter. Trinity quickly rose to prominence among the sect, the Drift algorithm in the process. These deletions included CONTINUING
culminating in their discovery of fossil spellcode hidden within files crucial to the operation of Valstravoth—the digitized THE
the Signal that Triune had broadcast centuries prior. After consciousness of a spectra, the outsider inhabitants of the CAMPAIGN
running countless simulations that suggested the code would Drift—who acts as the Dataverse’s main operator as a herald
unlock superior functions within the Drift, Trinity smuggled of the All-Code. Without proper instruction, Valstravoth has
the code into Nexus, Alluvion’s massive temple to Triune. become a mere easily manipulated shell, and is unable to
ADVENTURE
They plugged into one of the many terminals there to transfer perform the emergency functions of repairing the Drift and TOOLBOX
their mind into the Dataverse—a virtual realm containing reactivating Triune’s code.
manifestations of all the information collected by Triune over As a result, Triune has been cut off the pleas of its worshipers
the centuries—and brought the Architects’ patch to the Pylon of and unable to warn the Architects of the danger they’re putting
the Triumvirate, the center of the Dataverse and the only way the galaxy in. Not that Sovereign Trinity or their Architects
to access the algorithm that controls the Drift. would necessarily head Triune’s warnings anyway.

CHAPTER 1: CHAPTER 2: CHAPTER 3:


LOGGING IN ACCESS GRANTED HARD RESET
The PCs arrive in the virtual realm the Once inside the walled city of Central The PCs fly a trio of blessed starships
Dataverse and create the avatars that Program Utopia, the PCs must across the Digital Abyss toward the
will represent them there. They then confront Sovereign Trinity’s three summit of the Pylon of the Triumvirate,
must trek across the Rezwastes to lieutenants to acquire the access chips where they must get pass a corrupted
reach the Dataverse’s only city, Central necessary to access a locked-down herald of Triune. They eventually face
Program Utopia. hangar, enter the starships within, and Sovereign Trinity in an epic battle!
confront the Architect leader.

“INTO THE DATAVERSE” IS DESIGNED FOR FOUR CHARACTERS.


The PCs begin this The PCs should reach 12th The PCs should be 13th
11 adventure at 11th level.
12 level while they acquire the
three access chips.
13 level before their encounter
with Sovereign Trinity.

3
After all, they believe their fundamental plan to be flawless, sides, one for each of Triune’s component gods, that houses
and no amount of economic and environmental cataclysms the All-Code’s Algorithm, Triune’s sacred code. Encircling the
can change their mind now. pylon but separated from its cliff face by a small band of
empty space is Central Program Utopia—the City of Programs.
Moving away from the Pylon, Central Program Utopia
eventually gives way to the Rezwastes, a vast wilderness of

CHAPTER 1:
residual information that terminates abruptly into a jagged
cliff face leading down into the Digital Abyss.

LOGGING IN Partially Harmful Feedback: When creatures upload


themselves to the Dataverse, they are metaphysically
transferring all the information about themselves from their
material mind into a likeness of the PCs called an avatar, which
At the end of the previous adventure, the PCs fought their possesses replicas of any equipment they were wearing or
way into a secret sub-basement in the Nexus, Triune’s sacred carrying when they uploaded themselves. While any items
temple in the heart of Alluvion. Donning the VR equipment expended within the Dataverse aren’t consumed in the real
there, they connected their minds to virtual realm in which world and damage inflicted to the avatars isn’t dealt to their
the Architects have been meddling since the start of the material bodies, anything that corrupts or distorts a creature’s
Drift Crisis. This adventure begins immediately as their mind within the Dataverse will linger when they return to reality,
consciousnesses are uploaded into the Dataverse, with no representing damage dealt to the information that comprised
time passing. The Dataverse is a digital mindscape created their consciousness in the Dataverse. If a character dies in
by Triune, a place fantastic to behold yet almost mundane in the Dataverse, their mental data is scattered and reallocated
its appearance at the same time. Be sure to juxtapose these to the Rezwastes, where it is incorporated into the terrain or
elements throughout the adventure, especially when the PCs fauna of that region. Resurrection magic works on avatars in
are trekking across the Rezwastes. the Dataverse, piecing broken avatars back together, but if a
creature’s body is disconnected from the Dataverse before its
THE DATAVERSE avatar can be reconnected (be it from the avatar’s destruction
The Dataverse is a unique technological mindscape formed or a simple faulty connection), that creature awakens to reality
from deific simulations of all data gathered by Triune via without any memory of who they were or any skills they’ve
the Drift, which collects bites of information from across learned, effectively transforming them into a slate as blank as
the galaxy whenever someone uses a Drift engine to enter that of an android that has newly come online.
or exit the plane. In addition to serving as a great repository Avatars of Reality: Creatures native to the Dataverse are
for Triune’s vast, accumulated knowledge, the Dataverse called programs and have the program creature template (page
also houses Triune’s own code, the All-Code’s Algorithm, at 58). Creatures from other planes that upload their minds into
the mindscape’s heart atop the Pylon of the Triumvirate. the Dataverse are called avatars and are able to customize
While the PCs do not arrive physically within the Dataverse, their appearance within the Dataverse using a user interface
they uploaded their minds into the mindscape at the end of that resembles a character creation screen from a vidgame.
“Clockwork Demons,” and the versions of them that appear The PCs can customize their avatars’ appearance when they
throughout this adventure are formed from data of the first arrive, as described below. While the Architects who
memories and experiences of their own lives that they added appear within this adventure are technically avatars too,
to the Dataverse in doing so. Should these data avatars be all descriptions provided assume they have photorealistic
slain within the Dataverse, the data comprising them defrags, avatars unless otherwise stated. These NPCs gain none of the
resulting in the loss of those memories and experiences in the benefits the PCs receive.
real world, leaving that person’s material mind wiped clean of Low Gravity: The Dataverse has low gravity, which is
everything that makes them who they are. Such characters generated by the slow revolution of Central Program Utopia
are reduced to NPCs with no memories to speak of, like that of and the Rezwastes around the Pylon of the Triumvirate.
an android booting up for the first time. The following entries Enhanced Magic: All technomancer spells are enhanced
describe the mindscape’s traits; for more information about within the Dataverse, as are the spells cast by all true
mindscapes, see page 40 of Starfinder Adventure Path #23: worshipers of Triune, including all Architects encountered
Hive of Minds. throughout this adventure. Such spells cast within the
Self-Contained Shape: The Dataverse consists of three Dataverse function as if its caster level is 1 higher than normal.
finite regions, called zones, which float above the Digital
Abyss, an empty void of unused storage space theorized to be AVATARS: A VIRTUAL YOU!
as large as the Material Plane. At the center of the Dataverse When individuals upload their minds into the Dataverse,
is the Pylon of the Triumvirate, a massive structure with three the virtual realm rearranges strings of code into a facsimile

4
of their material form called an avatar. Unlike programs, Stylized Enhancements (Ex): Choose a weapon fusion that
which typically execute simplistic run processes that are can be applied to one of your weapons; that weapon gains the
engrained within their data, avatars have complete control benefits of that weapon fusion as long as you wield it in the
over their digital appearance within the Dataverse and can Dataverse. If you replace your chosen weapon while within
use this access to modify themselves with ease. After they the Dataverse, your chosen weapon fusion’s effects can be INTO THE
are granted avatars by Kuzori in Part 1 of this adventure, moved to another applicable weapon in your possession. DATAVERSE
the PCs gain a +1 divine bonus to ability checks, attack Stylized Physics (Ex): As a reaction when you attempt
rolls, saving throws, and skill checks. Additionally, each a saving throw, you can spend 1 Resolve Point to gain the
PC chooses one of the following art styles and gains the benefits of your choice of Great Fortitude, Iron Will, or
listed benefits. Once chosen, a PC can change their art style Lightning Reflexes; if you already have the chosen feat, you CHAPTER 1:
or any selected benefits of an art style only by using a can instead reroll the related saving throw if you fail it. LOGGING IN
mnemonic editor.
TOON
EXAGGERATED Your avatar serves as a simplified caricature of your real
CHAPTER 2:
Your avatar has wildly exaggerated facial features and appearance and doesn’t even attempt adhere to realism. ACCESS
expressions and is brightly accented. Toon Physics (Ex): You gain the benefits of mk II force soles GRANTED
Exaggerated Physics (Ex): You gain temporary Hit Points (Starfinder Armory 92); this doesn’t preclude you from having
equal to your level. These temporary Hit Points return, after other augmentations in your feet. CHAPTER 3:
spending a Resolve Point and resting for 10 minutes. Toon Step (Ex): When you take a guarded step, you can HARD
Extreme Motion (Ex): You can take an extra move action spend 1 Resolve Point to increase the distance you move to
during your turn. You can use this extra action to move half your land speed (minimum 10 feet).
RESET
before, during, or after any effects created by any standard
action or full action you also take during the round, INTO THE DATAVERSE
including between the attacks of a full attack. This benefit The PCs find themselves in front of a large, half-cylindrical
doesn’t stack with the effects of haste, the hurry envoy wall with six doors. Each stands before one of these glowing CONTINUING
improvisation, or similar effects. Once you’ve used extreme rectangular portals. Surrounding this wall is a quagmire of THE
motion, you can’t use it again until you take a full night’s data that looks like a burbling swamp. The PCs are fully healed CAMPAIGN
rest, though you can spend 1 Resolve Point at any point to and restored from any previous encounters. Their abilities and
recharge it immediately. Resolve Points have been refreshed, as if they had taken a full
8-hour rest. In addition, if any of the PCs were suffering from
ADVENTURE
PHOTOREALISTIC lingering ability damage, diseases, or poisons, those effects all TOOLBOX
Your avatar looks exactly like you do in the real world. end as they enter the Dataverse. They are in freshly minted digital
Gritty Realism (Ex): You gain a bonus feat that you meet bodies formed from their own memories and cognitive patterns.
the prerequisites for. However, these forms look like vidgame models without any
Realistic Resolve (Ex): When you take damage from an skins applied—simple wire frames covered by untextured meshes
effect that allows for a saving throw, you can spend 1 Resolve that only vaguely resemble their true appearances.
Point as a reaction to ignore all non-damage components of Read or paraphrase the following to begin the adventure.
the triggering effect.
Flashing lights and a cacophony of chirping bits and whirling
PIXEL shapes fade from vision, revealing the curve of a pristine white
Your avatar is rendered in simple blocks of color, giving you wall. A series of free-standing pillars of light glow near the
a retro aesthetic. wall, but everywhere else is a stretch of swamp that seems to
Pixel Physics (Ex): You gain the compression universal stretch on into infinity. At a glance, the forms of the various
creature rule. flora and other articles resemble the familiar, but upon closer
Pixel Strike (Ex): As part of making an attack roll, you can inspection, each shines with a neon radiance, lit by streams
spend 1 Resolve Point to turn your attack two-dimensional of binary code that dance across every surface. Neither sun
and slide it past your target’s defenses, resolving the attack nor stars can be seen above, as the skies are an eerie shade of
against their EAC. If the attack was already against EAC, you violet that seems to fade into an inky void. The smell of mire
gain a +2 circumstance bonus to your attack roll instead when wafts all around this area, its mucky scent not ameliorated in
you spend the Resolve Point. the slightest by the artificial nature of its source.

STYLIZED This area is the Hyperlink Universe Bridgeport (or HUB), a


Your avatar is highly customized with a unique, personal station for those who first enter the Dataverse but don’t share
aesthetic unlike any other. the Architects’ access to the virtual realm.

5
The PCs only have a few moments to marvel at their current Why should we trust you? “I-I don’t want anyone else to
environment before the words “Security Lockdown Enabled” suffer for the sake of our pride. I understand if you don’t think
flash in red in the bottom left-hand corner of their fields of you can trust me, and there isn’t much I can do to change your
vision; these words persist no matter where they turn their mind if you don’t give me the chance. All I can do for now is
gaze. Shortly after, their bodies freeze in place as an outside give you my word, and a secret of my own.” Kuzori then shifts
force physically prevents them from acting. A door-shaped from his human form to his true form (or rather, the augmented
portal opens in the curved wall, and a human man with jet black representation of it that is his avatar), his features changing
hair, dressed in a simple, gray suit steps out, carrying a datapad. to those of a vulpine humanoid with scintillating, rainbow-
The words "Security Operator" are printed on the front pocket colored fur lit by streams of data that glow like LEDs. A PC who
of his jacket. Without even looking at the PCs, asks in a friendly succeeds at a DC 15 Culture check identifies Kuzori as a kitsune,
tone who they are and why they’ve come to the Dataverse. a foxlike shapeshifter able to assume the form of another
The PCs may recognize this individual as Nojisora humanoid. If the result of the check exceeds the DC by 5
Kuzori (NG male kitsune ACD technomancer), the or more, the PC also knows that the act of a kitsune
friendly computer programmer they met on their revealing their true form to others is considered
first day in Alluvion, specifically in the opening intimate, adding some credence to the gesture.
scenes of Starfinder Adventure Path #49: A Who’s in charge of the Architects? “That’d
Light in the Dark. Kuzori came to Alluvion to be Sovereign Trinity. They’re an android who
help “debug the Drift” during this time of crisis , everybody says is the child of Triune, though I’m
putting his significant talents as a data engineer starting to wonder if that’s true. The Architects
to good work. He joined the Architects shortly want to revolutionize the Drift, and while plenty of
after his arrival, swayed by their rhetoric, people were skeptical when Trinity said the secret to
but found himself relegated to entry-level optimal Drift travel was hidden in Triune’s algorithm,
security detail after pledging himself to they started to believe them when they found
the cause. In his opinion, his talents as that piece of fossil spellcode.”
a computer programmer, hacker, and Fossil spellcode? “It’s like this ancient
technomancer are going to waste here, sequence of signals that Sovereign Trinity
guarding the HUB from any who might found buried within the Signal. You know,
upload themselves into the Dataverse and the broadcast Triune made to the universe
interfere with Architects’ plans. Lately, he’s like three centuries ago, the one that taught
begun questioning Sovereign Trinity’s leadership. everybody to build Drift engines at the end of the
While he knows he’s supposed to destroy Gap? Trinity was able to replicate the original
intruders immediately, he’s more interested in Nojisora Kuzori Signal by studying its cosmic echoes. They
learning about what’s been happening outside claimed it had an unused bit of spellcode that,
the Dataverse while he’s been logged on. Once he glances up with the proper modifications, could be used to improve the
from his tablet, he recognizes the PCs as the newcomers he Drift. In hindsight, it seems rather arrogant to think that they
met on his first day, and comments on this. could have improved upon a god’s design.”
Kuzori then stammers out an apology and disengages the Where is Sovereign Trinity?/Where is the fossil spellcode?
security lockdown with a touch to his datapad, allowing the “There!” Kuzori points to the horizon, where the faint outline
PCs to move once again. This is the first time he’s spoken needle-thin spire is visible towering above a city. “That city is
with someone even remotely interesting since uploading into Central Program Utopia. It’s this huge metropolis formed from
the Dataverse, so the talkative kitsune happily and eagerly all the information Triune collects and stores in the Dataverse.
engages with the PCs, asking them about what’s happened In the center of the ringed city, across a massive chasm
since their first meeting at Alluvion’s Tethers. If the PCs act called the Digital Abyss, is a big spire called the Pylon of the
hostile toward him, he begs them to calm down, noting that Triumvirate where a user can access the code of the Drift.
they are likely confused by where they are and that he can That’s where Sovereign Trinity uploaded the fossil spellcode,
help them get acclimated. Kuzori is genuinely unsettled and they’re supposedly there all the time, trying to get the
by any news the PCs share about his fellow Architect’s All-Code’s Algorithm to accept new iterations.”
deadly activities throughout Alluvion; a PC can determine How do we get there? “You’ll need specialized vessels to
this reaction is true with a successful DC 10 Sense Motive cross the Digital Abyss. They’re stored at a place called the
check, as Kuzori wears his emotions plainly. If presented PyPort Hangar in Central Program Utopia, but Sovereign
with reasonable evidence as to why the Architects need to Trinity has the entire facility sealed behind admin access.
be stopped, Kuzori will offer to assist the PCs, stating that he Even I can’t get in there! You’ll need an access chip from each
“never wanted anything like this to happen.” He also answers of the three members of her inner circle; a ysoki named Zolas,
any questions the PCs have. a gnoll named Bone Scrawl, and an SRO that calls themself

6
Drift Modification Unit—DMU for short. If you can get those TACTICS
access chips, we can fly out to the Pylon of the Triumvirate, During Combat Tactics aren’t a large part of the firewalls’
stop Sovereign Trinity, and remove the fossil spellcode! Maybe programming. They lash out against whomever has hurt
even repair the Drift!” them the most, focusing especially on any PC who can
Can’t you get the access chips? Kuzori raises his hands in deal cold damage. INTO THE
exasperation. “I wish. None of the other Architects respect Morale The firewalls fight until destroyed. DATAVERSE
me. They’ve got me on guard duty, can you believe it? All the
way out here in the Rezwastes! It’s a complete waste of my Development: The firewalls collapse into residual data
skills. No, those three are Sovereign Trinity’s innermost circle, when destroyed, save for several dozen shards of glowing,
and they’re super full of themselves. They wouldn’t give me golden bits. Moments after the last one falls, a small icon CHAPTER 1:
the time of day, much less their access chips. We’re going to resembling a ringing telephone appears in the bottom left- LOGGING IN
need to persuade them to hand the chips over, and it wouldn’t hand corner of each PCs’ peripheral vision. The jangle of
surprise me if it came down to violence. Though I’d prefer if the phone echoes in all their auditory sensors, as the ID
we could avoid killing people. If you die here in the Dataverse, “Fox9” appears above the phone receiver. If a PC attempts
CHAPTER 2:
your mind is utterly erased. Which is basically like dying in to answer the call, such as by physically gesturing or ACCESS
real life.” mentally providing consent, a call between that PC and GRANTED
Kuzori initiates; if multiple people answer, it creates a group
AVATAR CREATION chat. If at least one PC answers, Kuzori praises the group of CHAPTER 3:
Once Kuzori has answered the PCs’s questions to the best their combat acumen, confidently stating they might have HARD
of his ability, he agrees to provide them with what benefits an actual, real chance of not being “utterly annihilated” by
he can. While the PCs can’t come with him to the operator Sovereign Trinity and their circle if they keep up that level
RESET
room from which he monitors the HUB, he uses his datapad
to obscure information about the PCs, their movements and
their activities from the other Architects. This allows the PCs
to work in relatively secrecy throughout most of this CONTINUING
portion of the adventure. Additionally, Kuzori upgrades THE
the PCs’ Dataverse profiles with avatar accounts, CAMPAIGN
unlocking the customizable skins and their benefits.
At this time, provide the PCs with the information
found in the Avatars: A Virtual You! section on
ADVENTURE
page 4. Allow each player the time to select an art TOOLBOX
style for their PC’s avatar and describe what that
avatar looks like. Give the players time to accept
their chosen options.

EVENT 1: TUTORIAL MODE (CR 10)


Moments after the PCs finish customizing their avatars, dark
clouds brew around the Pylon of the Triumvirate as flashes
of violent code flare in the skies above. Ears drooping, Kuzori
yelps that a software storm is brewing and quickly hops back
through his doorway, wishing the PCs good luck and telling
them that he’ll be in touch.
The map for this encounter appears on page 8.
Creatures: As Kuzori vanishes, flashes of digital lightning
strike the Dataverse, one such bolt crashing into the nearby
quagmire. The swampy water roils as the soothing glow
of its code suddenly shifts to an angry, blinking crimson.
Sloughing mounds of fragmented code rise from the
virtual swamplands, corrupted vestiges of the Dataverse’s
now-compromised firewall. Huge Firewall
HUGE FIREWALLS (3) CR 7
XP 3,200 each
HP 105 each (page 58)

7
EVENT 1: TUTORIAL MODE EVENT 4: MOUNT DATAREST

EVENT 2: THE MUCKMARSH EVENT 5: THE RUMBLING HILLS

EVENT 3: THE LONELY TUNDRA EVENT 6: BYTEFLOWER FIELDS

NORTH

8
of performance. He apologizes for fleeing at the first sign of Unaware: Sovereign Trinity hasn’t realized that intruders
danger because he’s “not of much use in a fight.” are present in the Dataverse.
Kuzori gives the PCs permission to call him by contacting Hidden: Security operators have detected an unauthorized
his ID if they need any tips or guidance, but insists the most presence in the Dataverse, and have reported this to Sovereign
helpful thing he can do for them is keep Sovereign Trinity off Trinity, Zolas, Bone Scrawl, and DMU. The Architects are wary, INTO THE
their trails for as long as possible. He also instructs the PCs but unconcerned. DATAVERSE
to gather up the glowing bits that the firewalls left behind, Nominal Threat: Security operators have gathered
explaining that they’re called databytes and will essentially enough information to provide a good description of the PCs’
work like UPBs in the Dataverse, allowing the PCs to craft appearances and some of their capabilities. Architect NPCs
data equipment and swap them in Central Program Utopia generally know whether each PC would be classified as a CHAPTER 1:
for goods and services. Finally, he offers a road map for combatant, an expert, or a spellcaster, but know little else LOGGING IN
the party’s objective: they need to acquire vessels from about them. They are aware that an Architect is feeding the
the PlyPort Hangar to reach the Pylon of the Triumvirate PCs information, but do not know who.
and since he doesn’t have access, the PCs need to cross the Considerable Threat: Security operators have identified
CHAPTER 2:
Rezwastes to reach Central Program Utopia. There, they the mole in the Architects as Kuzori, and Sovereign Trinity ACCESS
must find Sovereign Trinity’s three lieutenants and acquire decides to make a spectacle of him to intimidate the PCs. GRANTED
their access chips to unlock the way into the PlyPort The next time the PCs try to contact Kuzori, Kuzori attempts
Hangar. Kuzori also mentions that, true to the city’s name, to contact them, or the PCs reach the PlyPort Hangar with CHAPTER 3:
Central Program Utopia is home to millions of sapient, albeit all three access chips (whichever happens first), Sovereign HARD
artificial, programs, and that there’s a well-liked refreshment Trinity calls the PCs on Kuzori’s line, informing them that the
suite called Router that they should begin their search in. kitsune will be disciplined strictly for his defiance. They offer
RESET
Kuzori warns the PCs that they’ve got limited time to act the PCs a chance to leave the Dataverse and never return,
before Sovereign Trinity and their followers catch wind of ensuring them that there will be no further mercies offered.
them, even with him running interference, so they shouldn’t Substantial Threat: Sovereign Trinity orders that her
spend too much time dallying. Architects frag the PCs on sight and has allocated all available CONTINUING
Treasure: The PCs receive 35,000 credits’ worth of resources into reducing them to residual data via software THE
databytes for defeating the firewalls. storms. Whenever the PCs roll for initiative, roll 1d4. On the CAMPAIGN
beginning of that round number, a bolt of violent code strikes
THE SOVEREIGN’S EYE a random PC, dealing 12d12 electricity damage (DC 19 Reflex
Kuzori’s warning about Sovereign Trinity is far idle; while he for half). This lightning strike occurs only once per encounter,
ADVENTURE
is the only security operator the PCs will meet during this and it does not occur if the PCs finish the encounter before TOOLBOX
adventure, dozens more exist throughout the Dataverse, the rolled round occurs.
all reporting their information to Zolas, Bone Scrawl, and
DMU, who in turn report to Sovereign Trinity. As Sovereign CROSSING THE REZWASTES
Trinity becomes more aware of the PCs and their actions, When a program or temporary files are deleted, the data
they respond to the growing threat in kind. comprising it is broken down into component bits of code
Throughout the adventure, different actions taken by the that are swept away from the Pylon of the Triumvirate like
PCs will increase Sovereign Trinity’s awareness of them, sand in an outward-blowing wind. Over time, this fragmented
which is measured using five steps: Unaware, Hidden, data coalesced into programs mimic simple flora and fauna, or
Nominal Threat, Considerable Threat, and Substantial file structures that resemble natural features such as forests,
Threat. Sovereign Trinity’s awareness of the party begins at oceans, plains, and similar biomes based on the Dataverse’s
Unaware. Each time a condition listed in the adventure occurs collected data. These spaces are known as the Rezwastes.
that increases their awareness of the PCs, improve their Over time, Central Program Utopia assimilates bits of the
awareness by the listed number of steps, up to a maximum of Rezwastes to grow and expand, with all data within the
Substantial Threat. In addition, Sovereign Trinity’s awareness Dataverse undergoing a cycle of operation, fragmentation,
of the PCs automatically increases by one step for each of and reintegration back into Triune’s glorious simulation.
their lieutenants the PCs defeat: Zolas (page 19), Bone Scrawl The Hyperlink Universe Bridgeport is near the outermost
(page 25) and Drift Modification Unit (page 29). This means limits of the Rezwastes, representing a back door into the
that no matter what course of action the PCs take, Sovereign Dataverse as compared to those located within the main
Trinity will regard them as at least a Considerable Threat by temple to Triune in Alluvion. While convenient for sneaking
the time they attempt to cross the Digital Abyss. into the simulation undetected, the PCs now must cross a
If you feel this adds too much complication to your game, vast, digital wilderness to reach their desired destination.
feel free to treat this subsystem as optional. Instead, use the Rather than arranging themselves in a matter that makes
reactions you think are appropriate to your party. geographic sense, these biomes are haphazardly placed,

9
The map for this encounter appears on page 8.
AN UNCANNY REALITY Skill: Computers DC 30, Profession (vidgamer) DC 20, or
Throughout this adventure, locations and creatures Survival DC 25.
are described plainly to quickly convey the gist of Challenge: Two lurking spywares (see Creatures below).
what things are. As the GM, remember that the PCs Success + 5: The PCs gain a surprise round against the
are adventuring in a fully digital reality comprised of lurking spywares.
raw data, and much of what they see as mundanity Success + 10: The PCs bypass the encounter, earning XP as
is simply their minds attempting to make sense though they had defeated the creatures in combat.
of the oddities around them. For example, while Failure: The PCs encounter the lurking spywares in a
in the Lonely Tundra (below), the PCs may catch 30-foot-square area of deep bog (Starfinder Core Rulebook
a snowflake, but closer inspection reveals that 398), which is surrounded by a 10-foot-wide ring of shallow
snowflake to be formed from dozens of pieces of bog. The lurking spyware predator can move through this
binary code attached to a central kernel. Sprinkle difficult terrain as if it were normal terrain.
descriptions like these throughout the adventure after Creatures: The lurking spywares resemble massive horses
relatively mundane descriptions to drive home just with rows of razor-sharp teeth, serpentine tongues, vaguely
how uncanny the Dataverse is. Most things in the human faces, and clawed, prehensile hands. They wait in
Dataverse give off a faint glow not unlike that of a the bog water, lying flat in attempt to avoid detection before
computer screen that’s roughly as bright as a candle, springing up to ambush the PCs.
meaning there’s a distinct lack of true darkness in the
Dataverse. Descriptions like these can help you signal LURKING SPYWARES (2) CR 10
the difference between the PCs’ reality and this one. XP 9,600 each
HP 165 each (page 58)
TACTICS
seeded entirely at random by an algorithm that cares little During Combat The programs aren’t subtle and try to grab
for the rules and mechanics of geographic distribution. As the closest PCs to hold them down in the swampy water
the PCs make their way toward Central Program Utopia, while rending them sharp claws.
they encounter the following events in order. Morale Each lurking spyware retreats deeper into the
For Events 2 through 6, the PCs must attempt skill swamp if reduced to 20 Hit Points or fewer.
checks to determine their aptitude at crossing the biome.
One PC attempts a skill check with one of the listed skills at EVENT 3: THE LONELY TUNDRA (CR 13)
the listed DC, while up to two additional PCs may attempt The expansive morass suddenly freezes into solid soil from
to aid, likewise any of the listed skills. If they succeed, which towering trees over 20 feet in diameter grasp at the
they face the challenge listed under the event. If the result sky. A steady powdering of digital snow gently accumulates
exceeds the DC by 5 or more, the challenge is modified as on the ground.
listed in the event’s Success + 5; ditto the Success + 10 The map for this encounter appears on page 8.
entries if the result exceeds the DC by 10 or more. If the Skill: Computers DC 30, Profession (vidgamer) DC 20, or
PCs fail, the challenge becomes more difficult as noted in Survival DC 25.
the event’s Failure entry. It takes 2 hours to trek through Challenge: One malware siren stalker (see Creature below).
each biome, reduced to 1 hour if the PC’s check exceeds the Success + 5: The PCs gain a surprise round against the
DC by 5 or more. malware siren stalker.
Treasure: After overcoming each encounter in Events Success + 10: The PCs bypass the encounter, earning XP as
2 through 6, the PCs discover salvageable data worth though they had defeated the creature in combat.
70,000 credits worth of databytes. As Kuzori described Failure: The PCs are caught completely off-guard by
(page 9), these databytes can be formed into nearly any the towering creature, whose body seems to blend in with
object, much like how UPBs are used in the Material the multitude of trees and other surrounding terrain in the
Plane. However, the PCs require special facilities to forge immediate area. Each PC must succeed at a DC 24 Will saving
databytes into equipment, which is only available in throw or be stunned for 1 round as the malware siren stalker
Central Program Utopia. appears with a blast of sound. This is a mind-affecting sense-
dependent sonic effect.
EVENT 2: THE MUCKMARSH (CR 12) Creature: The malware siren stalker resembles an
The Hyperlink Universe Bridgeport is located amid a morass emaciated, towering undead humanoid with a massive
of bubbling, sludge-like code that gurgles like an upset surround-sound stereo speaker in place of its head. The
stomach. Gaseous bubbles swell within the muck until their creature blares distortions of popular showtunes from the
surface tension ruptures, releasing foul-smelling vapors. post-Gap Silent War era.

10
MALWARE SIREN STALKER CR 13 Creature: The overlord algorithm resembles a huge red
XP 25,600 dragon with a crest on its head resembling a crown. It bellows
Unique program occult zombie (page 58, Starfinder Alien in rage as it circles Mount Datarest, blasting gouts of flame
Archive 114) every which way as the overwhelming heat of its hateful fire
N Colossal undead (technological) reduces any residual data caught in its blasts to slag. INTO THE
Init +0; Senses darkvision 120 ft.; Perception +23 DATAVERSE
DEFENSE HP 265 OVERLORD ALGORITHM CR 13
EAC 27; KAC 29 XP 25,600
Fort +15; Ref +15; Will +11 HP 225 (page 59)
DR 10/magic; Immunities undead immunities TACTICS CHAPTER 1:
Weakness staggered, virtual dependency During Combat The overlord algorithm begins by LOGGING IN
OFFENSE unleashing its breath weapon on as many PCs as
Speed 30 ft. possible; if it is unable to hit more than one PC, it instead
Melee slam +26 (3d12+21 B) casts slow, again targeting as many PCs as it can. The
CHAPTER 2:
Space 30 ft.; Reach 20 ft. algorithm tries to keep to the sky as much as it can, ACCESS
Offensive Abilities dying cacophony (4d6+13 So, DC 19) casting spells from a distance. GRANTED
TACTICS Morale The program flees back to its lair on the mountain if
During Combat The malware siren stalker pummels any PC reduced to fewer than 30 Hit Points. CHAPTER 3:
within reach. HARD
Morale This mindless program fights until it is destroyed.
RESET
STATISTICS
Str +8; Dex +0; Con —; Int —; Wis +4; Cha –2
Skills Athletics +28, Stealth +23 (+31 to hide in forests)
Other Abilities computerized mind, data construct,
mindless, unliving CONTINUING
SPECIAL ABILITIES THE
Dying Cacophony (Ex): When the malware siren stalker CAMPAIGN
is reduced to 0 Hit Points, its massive speaker lets
out a blast of sound that deals 4d6+13 sonic damage
to and permanently deafens all creatures within a
ADVENTURE
20-foot-radius burst. A creature can halve the TOOLBOX
damage and negate the deafened condition with
a successful DC 19 Fortitude saving throw.

EVENT 4: MOUNT DATAREST (CR 13)


Beyond the frigid wall of trees stands a literal mountain
of data, compressed into a jagged summit that pierces the
digital realm’s sky. Lines of code shimmer near the highest
peak. Upon closer inspection, the data comprising the
mountain is so thoroughly compacted that the individual
bits comprising it are completely indistinguishable from
one another.
The map for this encounter appears on page 8.
Skill: Computers DC 35, Profession (vidgamer) DC 25, or
Survival DC 30.
Challenge: One overlord algorithm (see Creature).
Success + 5: The PCs gain a surprise round against
the overlord algorithm.
Success + 10: The PCs bypass the encounter,
earning XP as though they had defeated the program
in combat.
Failure: The overlord algorithm gains a surprise round
against the PCs, and gains a +4 circumstance bonus to
its initiative. lurKiNg spyware

11
EVENT 5: THE RUMBLING HILLS (CR 13) Creature: The butcher bug is a malevolent piece of corrupted
The terrain smooths into rolling hills that consists of broken code; this error has taken on the form of a mordagast—a
fragments of holovid data, eroded by untold runcycles of species that resembles enormous praying mantises—from a
unuse. Jagged sections flicker with the information once decades-old horror holovid.
contained in each corrupted file, displaying everything from
Veskarium cartoons to Pact Worlds melodramas. BUTCHER BUG CR 13
The map for this encounter appears on page 8. XP 25,600
Skill: Computers DC 30, Culture DC 25, Profession Program mordagast butcher (page 58, Starfinder Alien
(vidgamer) DC 20, or Survival DC 25. Archive 4 72)
Challenge: One butcher bug (see Creature). DEFENSE HP 225
Success + 5: The PCs gain a surprise round against the Fort +17; Ref +17; Will +12; +4 vs. mind-affecting effects
butcher bug. Weaknesses virtual dependency
Success + 10: The PCs bypass the encounter, earning XP as TACTICS
though they had defeated the program in combat. During Combat The butcher bug attempts to grab the first
Failure: The butcher bug gains a surprise round against PC it strikes with its talon, and then uses phases strike
the PCs, as it returns to its non-diffused form within reach to target that PC’s EAC with its piercing talon.
of a PC. The PCs are flat-footed during this surprise round. Morale Though of animalistic intelligence, the program has
some self-preservation. It runs away when reduced to 10
or fewer Hit Points.
STATISTICS
Other Abilities computerized mind, data construct,
dissipate, void adaptation

EVENT 6: BYTEFLOWER FIELDS (CR 12)


Beyond the foothills of Mount Datarest, spanning the final
distance to Central Program Utopia, is a sprawling field of
flowers. Each flower consists of an intricate pattern of code,
with a brief 6-second holovid clip or sound file at the center.
Any movement, be it from a PC passing through the flowers
or rustling them with the propulsion of a jetpack overhead,
causes the flowers to play their files, causing a discordance of
mismatched songs and sounds to fill the air.
Skill: Computers DC 40, Profession (vidgamer) DC 25, or
Survival DC 30.
Challenge: Doomscroll poppies hazard (see Hazard
below).
Success + 5: The PCs gain a +2 circumstance bonus to
saving throws against the doomscroll poppies.
Success + 10: The PCs bypass the hazard entirely; they
still earn XP for overcoming it.
Failure: The PCs take a –2 penalty to saving throws
against the doomscroll poppies.
Hazard: A large patch of the digital flowers play
clips of tragedies resulting from the Drift Crash and
the resulting Drift Crisis, all of which the Dataverse
had archived for future record. The events depicted
are horrific, including a report of a starship called the
Marata (Starfinder Adventure Path #46: The Perfect
Storm) that vanished completely and an instance where a
group of Starfinders crash-landed on a distant world. These
flowers have a hypnotizing effect that plays on most sapient
creatures’ morbid curiosity, causing them to sit amid the
poppies and watch or listen to the many accounts of Drift
overlord algoritHm Crisis woes. The fascinated condition imparted by this hazard

12
is a mind-affecting, emotion, and compulsion effect that can’t low-ranking members of the Architects who look at as bored
be ended by simply shaking an affected individual, though as Kuzori did prior to the PCs’ arrival. From a distance, the
doing so allows them to attempt an additional Will saving PCs can spot a structure that looks like an archway scanning
throw per hour to end the condition. An affected creature can those who pass through it with a violet light. Even from a few
also be moved forcibly by others, but this doubles the amount hundred feet, a PC who succeeds at a DC 25 Computers check INTO THE
of time it takes to trek through the Byteflower Fields. Once a can determine that the scanning likely determines whether DATAVERSE
creature has attempted a saving throw to avoid the effects of someone entering the city is a program or a user; if present,
this hazard, they can’t be affected by it again for 24 hours. A SA1-3 and YE-706 can confirm this. If the PCs walk through the
PC that has a burrow speed gains a +4 circumstance bonus to archway without taking any precautions, several Architects
this hazard’s saving throw as they can go under the poppies. immediately mobilize to apprehend them before alerting CHAPTER 1:
Sovereign Trinity’s lieutenants. LOGGING IN
DOOMSCROLL POPPIES CR 12 The PCs can attempt to enter Central Program Utopia in
XP 19,200 several ways, as listed below. You should also consider any
Type technological; Perception DC 38; Disable Computers other reasonably plausible solutions offered by the party. If
CHAPTER 2:
or Physical Science DC 34 (temporarily disrupt the clips); the PCs attempt one of these methods and fail, or they simply ACCESS
Bypass Acrobatics 30 (allows one PC to flit through the walk through the archway without concern, Sovereign Trinity’s GRANTED
flowers without disturbing them) awareness of them increases by one step (page 9) as the four
Trigger proximity; Reset instantaneous Architect programmers standing guard alert their superiors CHAPTER 3:
Initial Effect fascinated 2d4 hours; Will DC 21 to avoid; before engaging the PCs head-on (see Creatures, below). HARD
multiple targets (all targets within 15 feet of the poppies); Disguise: The PCs can attempt to walk straight through the
Secondary Effect after each hour spent fascinated, archway with a clever disguise. The Architect guards aren’t
RESET
an affected creature moves one step down the mental paying much attention, but the scanner will out them as not
disease track (with comatose as the end state); Will DC being programs unless at least one PC succeeds at a DC 38
21 to avoid affliction progression Disguise check. Reduce this DC by 10 if the PCs coat their bodies
with digital detritus from the Rezwastes; a PC who succeeds at CONTINUING
Succumbed to Doom: Near the patch of doomscroll poppies a DC 25 Computers check realizes this measure might help fool THE
is a pair of programs, lying on their backs and sobbing the scanner. If SA1-3 and YE-706 are with the PCs, they can ask CAMPAIGN
uncontrollably—SA1-3 (N agender program [page 58] android some of the other nearby programs to form a close-knit group
mechanic) and YE-706 (N agender program [page 58] android around the PCs to shield them from the scanners; otherwise, a
technomancer). If carried out of the fields or freed from the PC who succeeds at a DC 25 Diplomacy check can make that
ADVENTURE
flowers’ effects with an ability or spell like remove affliction, request of the nearby programs. This also reduces the Disguise TOOLBOX
these programs can guide the PCs the rest of the way to the DC by 10, and both reductions are cumulative.
city, if asked. Over the Wall: The PCs can choose to simply fly over
Along the way, they describe the oddities that have Central Program Utopia’s borders using jet packs, a 3rd-level
befallen Central Program Utopia in the past several months. flight spell, or similar means. The 30-foot-high wall can also
SA1-3 notes that after the Pylon of the Triumvirate suddenly be climbed with a successful DC 30 Athletics check. However,
shut down several thousand runcycles ago (amounting Architect drones are patrolling the skies, and each PC must
to months), the Dataverse saw the first wave of software succeed at a DC 25 Stealth check to avoid being detected
storms that conjured all manner of corrupted programs while passing over the wall. If any PC fails, the Architect
throughout the city. YE-706 adds that the pylon shutdown programmers assemble in 1d4 minutes and confront them in
also preceded Architect users enacting a kind of martial law the air using jet packs of their own.
in the city, deleting any programs who refused to alter their Teleportation: Teleportation magic and other similar effects
functions. The PCs can put together that the timeline of the with medium range or longer, such as dimension door, can get
programs’ story lines up with the Drift Crash and subsequent the PCs inside the city walls without consequence.
Drift Crisis. Creatures: Four low-ranking Architect programmers watch
In addition, both programs are easily able to tell that the over the access point, ready to confront any non-programs
PCs aren’t programs themselves and warn them that without trying to enter.
help they’re all but assured to be stopped at the Architects’
check points into the Central Program Utopia. ARCHITECT PROGRAMMERS (4) CR 8
XP 4,800 each
ACCESS PORT DESCIOS (CR 12) Android mechanic
When the PCs reach Central Program Utopia, they discover N Medium humanoid (android)
a walled city with limited access ports. The closest is Access Init +4; Senses darkvision 60 ft., low-light vision;
Port Descios, which is currently being guarded by several Perception +21

13
DEFENSE HP 115 EACH these domiciles, and programs walk along the paths going
EAC 20; KAC 21 about their predetermined business. Users such as the PCs
Fort +9; Ref +9; Will +9; +2 vs. disease, mind-affecting stand out like flecks of dust on an otherwise immaculate
effects, poison, and sleep surface, their non-necessity blatantly obvious amid the sleek,
OFFENSE efficient design of the city.
Speed 30 ft. After gaining entry to Central Program Utopia, the PCs’
Melee buzzblade dueling sword +15 (2d6+10 S) or first order of business should be to find Router, the place
tactical knife +15 (2d4+10 S) Kuzori recommended they use as a launch point for the quest
Ranged s-band scorchgun +17 (1d10+8 F) to locate Sovereign Trinity’s lieutenants; Kuzori calls the PCs
Offensive Abilities overload (DC 18), target tracking to remind them of this if necessary. Router is a software
(Starfinder Alien Archive 138) suite that serves as a refreshment establishment for weary
TACTICS programs in need of entertainment.
During Combat Each Architect programmer designates a The PCs can attempt to ask local programs for directions
different PC with target tracking and attacks until that with a DC 30 Diplomacy check to gather information from
foe has been downed. They then move onto another PC. local programs, who are wary of users since the tyranny
Morale An Architect programmer surrenders if at the hands of the Architects began. Alternatively, a
reduced to fewer than 10 Hit Points or if all PC can attempt a DC 25 Computers check to recall
their allies have surrendered or knowledge. On a success, they understand how to
been taken down. follow the circuitry of Central Program Utopia to reach
STATISTICS any destination. If SA1-3 and YE-706 are with the
Str +2; Dex +4; Con +2; Int +6; Wis PCs, the programs can guide the PCs directly to
+1; Cha +0 Router before parting ways. If the PCs attempt
Skills Athletics +16, Bluff +16, either of the above checks and fail, they stumble
Computers +21, Engineering +21, upon Router after 1d4+4 hours and Sovereign
Physical Science +16 Trinity’s awareness of them increases by
Languages Akitonian, Brethedan, one step (page 9) as word of strange users
Common, Kasatha, Shirren, Vercite, unaffiliated with the Architects spread.
Ysoki Inside Router, the PCs find that most of
Other Abilities artificial intelligence the programs there don’t want anything
(exocortex), constructed, expert to do with them, same as on the streets.
rig (armor upgrade), flat affect, No Architects are present within Router,
mechanic tricks (energy shield but there is a single program more than
[14 HP, 8 minutes], improved happy to converse with the PCs. That program
overcharge [+2d6]), miracle is CapCap Couserge, a bootleg copy of the
worker (1/day), remote hack (DC 18), infamous Captain Concierge program uploaded
upgrade slot (expert rig), wireless hack to the Dataverse by Triunite acolytes before
Gear kasatha microcord III (backup generator), the Drift Crisis. Known for its incessant need to
buzzblade dueling sword with 2 batteries (20 help, CapCap appears much as the Captain does on
charges each), tactical knife, s-band scorchgun AR computer screens in the real world—a spunky blue
with 2 batteries (20 charges each), spell ampoule of skittermander with a cybernetic eye dressed as a
disguise self sea captain who constantly squeaks its catchphrase,
“Can help-help?” Only, being a glitched copy, CapCap is
Story Award: If the PCs successfully enter the city prone to visual errors and is even more insufferable
without having to fight the Architect programmers, than the program they were copied from, their speech
award them XP as if they had defeated these constantly glitching into garbled nonsense at random,
Architects in combat. save for their catchphrase which the program speaks at
some point during almost every sentence they sputter
FINDING SOME HELP-HELP out. However, CapCap is more than happy to aid
Central Program Utopia is the motherboard upon the PCs; the skittermander is aware of all three
which the entire Dataverse operates, its buildings lieutenants’ current locations and happily
designed to resemble enormous chips connected by circuitry informs the PCs of each: Zolas can be found
streets. Massive landmarks resembling key within the Mount of the Iron Goddess,
components such as ports, headers, panel
connectors, sockets, and slots tower above
arcHitect programmer Bone Scrawl in Precursor’s Foundry,
and DMU in the Transcendent

14
Archives. CapCap even helpfully upgrades the PCs’ avatar
interfaces with a minimap of Central Program Utopia, marks DATABYTE CRAFTING
the locations of all three locations on the map (plus the The helpful skittermander CapCap explains the
PlyPort Hangar if the PCs note it as their ultimate objective), process by which databytes can be converted
and happily offers to teach them how to synthesize virtual into equipment. Within the Dataverse, databytes INTO THE
gear (see the Databyte Crafting sidebar below). effectively function as UPBs, with 1 databyte being DATAVERSE
equal to 1 credits worth of UBPs. Crafting with
databytes is much simpler than crafting with UPBs,
however; for every hour that crafting an item would
CHAPTER 1:
CHAPTER 2:
normally take in the real world, it takes only 1 minute
in the Dataverse. As a result, crafting an item that has LOGGING IN
ACCESS GRANTED an item level equal to the number of ranks you have in
the necessary skill takes 4 minutes instead of 4 hours,
crafting an item that has an item level that’s 5 or more
CHAPTER 2:
less than the number of ranks you have in the skill
ACCESS
The PCs can face Sovereign Trinity’s three lieutenants in takes 2 minutes instead of 2 hours, and so on. GRANTED
any order they choose during this portion of the adventure. Databytes are formed from raw code, and while they
The ring-shaped city of Central Program Utopia is split into can be found simply laying around in the Rezwastes, CHAPTER 3:
three even metrosegments, one for each of Triune’s three within Central Program Utopia raw code is typically HARD
component deities. reused quickly. If the PCs don’t want to craft their
RESET
own equipment during this adventure, they can spend
THE MOUNT OF THE IRON GODDESS their databytes at merchant software suites (otherwise
Formed from complex data about cultures from across known as shops) within CPU. Fortunately (or perhaps
realities, the Casandaleen Metrosegment is Central Program unfortunately), CapCap can also transmute equipment
Utopia’s premiere residential district, home to most of the that the PCs provide to him into databytes, essentially CONTINUING
city’s program inhabitants. The various chips here house dismantling the item into databytes with a value equal THE
software formed from data about key aspects of different to 10% of the item’s price. This process takes CapCap CAMPAIGN
societies—architecture resembling that of every material and 1d4 hours for every 10,000 credits worth of items. If
extraplanar culture exists, from towering morlamaw monoliths the PCs dismantle the equipment that appeared with
of old to infernal spires resembling Hell’s terrible fortresses. them in the Dataverse, that equipment is unaffected in
ADVENTURE
The Mount of the Iron Goddess stands at the center of the the material world. Similarly, any equipment the PCs TOOLBOX
Casandaleen Metrosegment, a monument to the successes construct in the dataverse doesn’t return with them to
of mortal culture. This silver spire showcases Triune’s data the real world at the end of this adventure.
on what they consider to be mortalkind’s greatest cultural
achievements and accomplishments, and for Casandalee, the
Iron Goddess of Lost Golarion, few accomplishments held a During the PCs’ exploration of the city, they learn that
higher place than the construction of Absalom Station. As Zolas is hosting a gala within the Mount of the Iron Goddess
a result, a full-size, silver replica of Absalom Station stands and has hacked the metrosegment’s zeitgeist algorithm so
affixed to the top of the Mount of the Iron Goddess, cycling the local programs literally can’t talk about anything else.
through neon shades of blue, green, pink, and violet as it Though he’s not concerned about being attacked during the
gently oscillates, producing gentle, cooling breezes that can celebrations, he has caught wind that someone has breached
be felt throughout the metrosegment. the Dataverse—if Sovereign Trinity’s awareness of the PCs
After Sovereign Trinity declared martial law throughout is at least hidden, he’s seen reports of the PCs’ activities
the Dataverse, the hedonistic ysoki Zolas quickly established directly. If Sovereign Trinity’s awareness is unaware, Zolas
the Casandaleen Metrosegment as his sector, hording all has heard rumblings from outside of the Nexus but has
cultural data he deemed desirable and pleasurable within little evidence to work with. Zolas has Architect guards as
the Mount of the Iron Goddess. From there, he hacked well as a state-of-the-art security system in place outside of
the data and programs to provide himself with a lifestyle the spire’s entrance to thwart anyone who may attempt to
of luxury and personal pleasure that nearly exceeds the crash the party.
bounds of mortal comprehension. To reach Zolas, the PCs To confront Zolas, the PCs first need to gain access to the
need to infiltrate what may very well be the second-most gala inside the Mount of the Iron Goddess, which requires
secure place in the entirety of the Dataverse by doing their them to search out crucial information about how the access
best to emulate the sort of posh company Zolas wishes to archway leading to the spire’s sole elevator works, as well as
surround himself with. choose a partner to help fool that aspect of security.

15
RECALL KNOWLEDGE (COMPUTERS OR EVALUATING THE GUESTS
ENGINEERING) Once the PCs learn that the algorithm determining which
The PCs can learn the following information about the Mount guests have access to the gala, they can spend 10 minutes
of the Iron Goddess’s security by recalling knowledge using interviewing the throng of unescorted hopefuls present
either Computers or Engineering. to learn their names, which are listed in Handout #1: Party
DC 20+: The security checkpoint into the Mount of the Hopefuls. After assessing the names, each PC can choose a
Iron Goddess features an archway identical to the one at single program to walk through the Access Archway with.
Access Point Descios that will automatically determine if a When a PC chooses a partner, that program’s species and
user or a program without the proper authorization attempts gender instantly change to match that PC’s preferences, and
to enter the tower. The PCs could likely fool the archway if if questioned about their thoughts on the change the program
they crossed under alongside another program, as though expresses genuine confusion, believing that they’ve always
they were on a date. The players automatically know this looked like that. The programs in Handout #1 that meet
information if they accompanied SA1-3 and YE-706 through the algorithm’s criteria are: Ace-127, Aeon-541, Agee-523,
Access Point Descios. Aqua-730, Beau-28, Eide-82, Kae-10117, and Ouzo-2116.
DC 25+: Not all programs appear to have access to the
Mount of the Iron Goddess; an unregistered program would ENTERING THE PARTY
set off the security archway much like a user would. The PCs can safely step through the access archway accompanied
by an authorized program. Alternatively, if a PC has a way to
GATHER INFORMATION (DIPLOMACY), NOTICE access a computer system at a distance, they can temporarily
(PERCEPTION), OR RECALL KNOWLEDGE disable the security system with a successful DC 32 Computers
(PHYSICAL SCIENCE) check combined with a successful DC 25 Stealth check to conceal
The PCs can learn the following information by recalling their attempted hack; failure on either check results in the same
knowledge using Physical Science. A PC can also gather outcome as if they didn’t disable the security. Should the PCs
information with a successful Diplomacy check or use come up with some other clever plan, allow them to surprise you.
Perception to notice this information instead, but doing No matter what, no obvious alarm is sounded when the
so also requires the PC to succeed at a DC 25 Bluff check PCs step through the access archway, even if they take no
(if gathering information) or a DC 25 Stealth check (if precautions. However, if one of the PCs chose the wrong
noticing) to avoid Sovereign Trinity’s awareness improving program to escort or failed at any check to disable or bypass
by one step. the security system, Zolas is alerted to their presence via
At your discretion, the PCs can acquire this information his comm link and immediately informs his boss; increase
with successful DC 25 skill checks with other applicable skills. Sovereign Trinity’s awareness of the PCs by one step and
For example, a PC might use Intimidate to scare a program or increase the DCs to discover where Zolas is by 2 (see below).
a captured Architect guard into revealing these secrets, or use Past the Archway is an elevator which takes the PCs up to
Computers to hack into the raw data comprising one of the a scene of unparalleled extravagance—a perfect scale replica
programs. of Absalom Station’s Eye District, save that the streets and
DC 10+: Programs pass through the access archway in pairs. sidewalks are paved with marble and the skyscrapers wrought
DC 25+: Program access is determined randomly using from solid gold. The structures stretch towards the false
an algorithm, and for this celebration, Zolas’s algorithm has station’s domed ceiling, beyond which an otherworldly nebula
determined that programs whose names meet the following shaded in tones of pink, blue, and violet shimmers. Lights here
criteria have access: the name contains exactly 1 consonant, strobe in rhythmic pulses, and programs resembling sapient
at least 1 prime digit between 0 and 9, and all its digits add beings from across the galaxy move and sway in perfect
up to exactly 10. The prime numbers between 0 and 9 are 2, synchronization to the strange melody both on the streets and
3, 5, and 7. high above in the windows of every shining building.

HANDOUT #1: PARTY HOPEFULS


Drugr-57 Beau-28 Farce-80 Ace-127 Temperance-55 Serenity-12
Eide-55 Radiance-37 Ohia-01 Oi-777 Olio-111 Curiosity-11
Aqua-730 Discovery-55 Aero-99 Circuitry-52 Etui-367 Visjr-81
Ouzo-2116 Neebles-325 Amie-46 Chromus-505 Aeon-541 Xigwidjet-352
Oke-91 Mitsuku-2 Eide-82 Dossier-271 Agee-523 Anchor-821
Juniper-90 Kae-10117 Lozholdo-0 Lieu-649 Talon-322 Zolgo-123

16
INTO THE
DATAVERSE

CHAPTER 1:
LOGGING IN

CHAPTER 2:
ACCESS
GRANTED

CHAPTER 3:
HARD
RESET

CONTINUING
THE
CAMPAIGN
With a replica of an entire Absalom Station district stretched course of action using one of their best skills. For example,
out before them, the PCs won’t be able to locate Zolas easily. a soldier that is very good with Athletics could go to a bar
Though the area might be familiar to PCs who are from or and attempt to literally strong arm a program into providing
ADVENTURE
have visited the Pact Worlds capital, this facsimile has been information through a bout of arm wrestling. TOOLBOX
converted into a city-wide extravaganza of digital debauchery For each PC who succeeds at a DC 28 skill check, they
where programs endlessly dance in repeated loops, engage uncover one of the pieces of information listed below (in order).
in prerecorded small talk with one another, and heedlessly If the PC knows a spell or has a special ability that could allow
consume holographic food and drink. Many streetlamps are them to learn any such information, they may use that ability to
mirrored like disco balls, while hidden speakers blare the automatically succeed at one skill check. A PC can’t use the same
latest trance music from hit groups such as Thresher Face, skill or ability twice to learn additional pieces of information.
Thinking of You, and Countdown to Damnation. The entire • A guest overheard Zolas complaining about the amount of
scenario is likely disconcerting, like a fervent dream one has work that his supervisor, someone named Sovereign Trinity,
after consuming one too many intoxicants. required him to do. The guest posits that wherever Zolas is,
Note that the programs within the Mount of the Iron he would need to have a relatively fast infosphere uplink to
Goddess are engaging in all manner of social niceties relevant do the kind of intricate coding he spoke of.
to the current setting not because they are fully autonomous • A guest notes that on the rare occasions Zolas sleeps, he
individuals capable of expressing personal preference for such usually staggers off toward Nyori Palisades, a very high-end
activities, but because the code that comprises their digital residential neighborhood on digital Absalom Station.
existence dictates their behaviors. Two programs dancing • Zolas once bragged to a guest that his made “quite the
together, for instance, are likely comprised of recorded visual modifications” to a few buildings in Nyori Palisades from
data of all manner of dancing. their real-world counterparts that he believes Sovereign
Zolas is currently enjoying his massive party at a temple- Trinity would find very pleasing.
turned-nightclub called All-Code’s Alley (area A). The PCs will • While this particular guest doesn’t know much about
need to bring all their skills to bear to find him, but should where Zolas has been staying, they do find it amusing
have complete freedom to be as creative as they like. Ask each that he often hums a few bars of a Triunite hymn before
player how they would like to track down Sovereign Trinity’s apologizing, saying, “The blasted things really get stuck in
lieutenant, and if they seem stumped, offer a suggestion of a your head, don’t they?”

17
• A program comprised of data about religious sermons programs mingle around and outside of the temple, focused
complains that Zolas has created his own church to Triune on performing their specific functions.
called All-Code’s Alley in Nyori Palisades and that his
debauchery shames the deity. There is a raucous party happening within All-Code’s Alley,
and the temple is packed with partying programs, as well as a
If the PCs don’t learn where Zolas is after exhausting all few Architect avatars. No one seems to pay the PCs any mind
their skills and abilities, they overhear a passing group of as they walk through the front door uncontested; all other
partying Architects mention that “one of Sovereign Trinity’s guests are visibly armed, so the PCs’ gear doesn’t stand out in
lieutenants” is holding a rave at All-Code’s Alley. However, one the crowd. The map for All-Code’s Alley appears on page 20.
of these Architects quietly notices the PCs, and relays that At Zolas’s decree, any Architects in attendance at this party
information to Zolas when the group arrives. Zolas and his are disguised as programs, as is the lieutenant himself. While
crew are prepared for the PCs and gain a +4 circumstance the Architects in the other parts of Central Program Utopia
bonus to their initiative checks. were easy to spot, the PCs don’t know who their foes are
here. Any number of the programs here could be Architects in
A. ALL-CODE’S ALLEY (CR 13) disguise, so they should be wary about starting a brawl and
quickly becoming overwhelmed. If necessary, Kuzori can call
Appearing akin to a tower modem large enough for sapient the PCs and give them this warning.
species to enter, this not-so-humble house of Triune is a The PCs can choose to split up or stick together as they
palace of unabashed opulence, sparkling with life as though mingle or poke around in All-Code’s Alley’s chambers to find
it were a serve supporting the Dataverse in its entirety. Zolas. A solitary PC can attempt a skill check to examine
Adamantine alloy walls accented with solid gold plates give individuals in a room, question them, or even browbeat them
the illusion of computer circuitry. Numerous partygoing into leaving the party. If several PCs are together, one PC
can attempt the skill check and the others can attempt to
aid using the same skill. This skill check is a DC 30 Culture,
Perception, or Sense Motive check or a DC 32 Diplomacy
or Intimidate check, depending on the tactic used. At your
discretion, other creative uses of skills or abilities can
be used.
Meanwhile, programs are constantly entering and
exiting the party, as well as moving between the temple’s
rooms. When the PCs enter All-Code’s Alley, roll 1d4+1. The
result determines which room Zolas and his two Architect
programmer buddies start in (2: area A2, 3: area A3, and so
on). After each time a PC attempts a skill check in a room
to intuit which program is Zolas in disguise or to talk to the
programs there (see below), roll 1d4+1 again. Zolas and his
entourage then move to the room indicated by that roll The
DC for a skill check in a room which Zolas is in is 5 higher,
but if a PC succeeds at that check, they reveal Zolas (see
Creatures below). Each time Zolas enters a room in which he
has already been, the increase in DC decreases by 1.
Creatures: When the PCs ferret out Zolas, he drops
his disguise, as do the two Architect programmers with
him. The ysoki’s avatar is dressed in a stylish suit and has
immaculately combed fur. He sneers that the PCs “aren’t any
fun” and that they’ll “never understand Sovereign Trinity’s
genius.” As he and the two Architects initiate combat, two
programs composed of data on the phenomenon of “clout
chasing” declare their allegiance to Zolas and join in the fight,
though they’re mostly there to support the lieutenant.

UNWITTING SUBROUTINES (2) CR 5


XP 1,600 each
zolas HP 78 each (page 58)

18
TACTICS STATISTICS
During Combat The unwitting subroutines mostly stay out Str +0; Dex +5; Con +3; Int +8; Wis +0; Cha +0
of combat, using their envoy improvisations to help focus Skills Computers +25, Engineering +25, Life Science +20,
the Architects’ fire and taking the occasional potshot Sleight of Hand +25, Stealth +25, Survival +20
at a distracted PC. When Zolas is reduced to 100 Hit Languages Akitonian, Common, Brethedan, Castrovelian, INTO THE
Points or fewer, or if one of the Architect programmers Shirren, Triaxian, Vercite, Vesk, Ysoki DATAVERSE
surrenders or is taken down, the two programs cry out Other Abilities cache capacitor 1 (disguise self), cheek
in anger and focus all their energy on defeating the PCs. pouches, magic hacks (cache concentration COM, harmful
Morale The unwitting subroutines follow their corrupted spells), moxie, spell cache (silver holy symbol of Triune)
programing to aid Zolas to their own deletion. Gear kasatha microcord IV, LFD sonic pistol with 2 CHAPTER 1:
high-capacity batteries (40 charges each) LOGGING IN
ARCHITECT PROGRAMMERS (2) CR 8
XP 4,800 each Cascade Error: If Zolas is brought to 0 Hit Points, his
HP 115 each (page 13) avatar begins to glitch, which quickly spreads to a few
CHAPTER 2:
nearby programs as the Dataverse is unable to contain the ACCESS
TACTICS
During Combat The Architect programmers choose a PC error. Alternatively, if Zolas surrenders, after a few moments GRANTED
at random and both attack that foe using with target of promising the PCs whatever they need, the ysoki tries to
tracking until that foe has been downed. They then move surreptitiously log out, but instead begins to cycle his avatar CHAPTER 3:
onto another PC. through the series of disguises he’s been using. This causes a HARD
Morale An Architect programmer surrenders if reduced to similar cascading glitch. In either case, move immediately to
fewer than 15 Hit Points. Event 7 (page 21).
RESET

ZOLAS CR 11 A1. ENTRANCE HALL


XP 12,800
Male ysoki technomancer This gilded entrance hall is lined with resplendent marble CONTINUING
Small humanoid (ysoki) with gold-flecked veins resembling the delicate wiring of a THE
Init +5; Senses darkvision 60 ft.; Perception +20 computer chip. Three sets of massive gold pillars flank a red CAMPAIGN
DEFENSE HP 155 RP 5 carpet extending from the entrance to the doorway into the
EAC 23; KAC 24 main chapel, its double doors formed of transparent aluminum.
Fort +10; Ref +10; Will +14
ADVENTURE
OFFENSE Even this entrance hall is crowded with party goers, TOOLBOX
Speed 30 ft. chatting idly with one another as they admire the décor. The
Melee ultrathin dueling sword +17 (3d6+11 S) sound of the music from the chapel is only slightly muffled
Ranged LFD sonic pistol +19 (2d8+11 So; critical deafen by the walls.
[DC 20])
Technomancer Spells Known (CL 11th; melee +17) A2. MAIN CHAPEL
4th (3/day)—overload systems (DC 22), wall of fire
3rd (6/day)—arcing surge (DC 21), displacement, instant A red carpet rolls from the entryway to bisect this glorious
virus (DC 21), slow (DC 21) chapel all the way to the raised stage which dominates the
2nd (at will)—dampen spell GM, microbot assault rear quarter. The floors are otherwise made of solid gold
TACTICS adorned with intricate circuitry. Long pews line either side
During Combat Zolas begins combat by casting microbot of the red carpet, each with rows of data pads built into
assault, using his cache concentration magic hack its back. At its center stands an altar adorned with gilded
to maintain the spell. He then alternates between cloth, which sits atop a carpeted impression of Triune’s holy
debuffing his foes with overload systems and slow and symbol framed by a massive computer tower. An elaborate
blasting them with arcing surge or his sonic pistol. Zolas sound system has been installed onto the altar. A series of
uses his reaction to cast dampen spell against enemy doors line the southern wall.
spellcaster’s magic.
Morale Zolas, under no circumstances, wants to die. As the largest room in All-Code’s Alley, it of course contains
He tries to negotiate with the PCs if reduced to 20 the most party goers. They are dancing, drinking, and
Hit Points or fewer, or to 50 Hit Points or fewer if his laughing, lending a bacchanalian atmosphere to this chapel.
programmers and unwitting subroutine fans are also The music blasting from the sound system is nearly deafening,
defeated. He offers the PCs whatever they want in imparting a –2 penalty to Perception and Sense Motive checks
exchange for his life. attempted here. It can be shut down with a successful DC 30

19
A. ALL-CODE’S ALLEY

A2

A3 A4 A1 A5

Engineering check, but the party goers glare at the PC who Treasure: The datapad itself is similarly a find. CapCap in
does so; they take a –4 penalty to Diplomacy and Intimidate Router can turn the datapad into 32,010 databytes; increase
checks throughout the entire party. Unless someone keeps an this amount by 4,070 databytes if its spell chip hasn’t been
eye on the sound system, a program turns it back on within consumed by the countermeasure system.
10 minutes.
A4. RESTROOMS
A3. OFFICE This pristine public bathroom contains a number of stalls for
churchgoers, but like the rest of All-Code’s Alley, it is packed
An antique wooden desk is the primary feature of this with party goers, whose voices echo off the ceramic tile. None
spacious office, adorned in the wood paneling evocative of of the attendees actually use the stalls, however, as programs
computer chips and motherboards. The eastern wall is a single, have little need to use washroom facilities for either their
continuous bookshelf lined with the scriptures of Triune. intended or illicit purposes.

The party spills into this office as well, shattering its otherwise A5. MEETING ROOM
studious nature. The desk has a single drawer, which is locked
with a very good lock (DC 35 Engineering to open). The only Marble flooring with circuitry patterns etched into every
noteworthy item within is a datapad that functions as a tier 6 tile adorns this otherwise simple room, its walls a tasteful
computer with six miniaturization modules, a wipe module, and eggshell white. In the center of the chamber lies a plush
a spell chip of miasmaCOM (DC 21) attached to a countermeasure. purple carpet with the holy symbol of Triune emblazoned in
If the PCs attempt to hack the datapad and fail by 5 or more, the gold thread. A fully stocked bar has been set up against the
spell chip countermeasure triggers, casting miasma centered on eastern wall.
itself, and then all data on the datapad is wiped.
If a PC successfully gains access without triggering the This room’s original purpose would have been for
wipe protocol, they find a detailed record that explains how the church-related meetings, but it now functions as the party’s
Architects discovered the fossil spellcode and how its compiling source of alcoholic beverages. Programs can help themselves
ultimately led to the Drift Crash and subsequent Drift Crisis, as to the wide array of drinks available at the bar for free, and
well as all Architect activities since. Provide the PCs with any the digital stock never runs out. A few inebriated programs
information from the Adventure Background that they don’t are dancing frantically with one another on the purple carpet,
already know. while others look on in amusement.

20
EVENT 7: THE PARTY’S OVER (CR 13) know that irreversible cognitive uplink will be required
No matter where the PCs are in All-Code’s Alley when they to restore the Pylon. As I have done in mortal life, so too
defeat Zolas, they must first deal with the repercussions of will any who follow in my footsteps to repair our greatest
his cascading system error before acquiring his access chip. creation. Best of luck to you, child of the stars."
Creature: A glitchdread amalgam is an “undead” program, INTO THE
an unholy and horrifying fusion of several glitching programs Treasure: Upon completion of its message, the access chip DATAVERSE
and avatar skins. It howls in pain, each of its faces twisted in synthesizes 200,000 databytes for the PCs.
agony, as it attacks whomever is close by—namely, the PCs!
This glitchdread amalgam’s spatial incorporeality defensive B. PRECURSOR’S FOUNDRY
ability is unique in that while the Dataverse can be reached The most industrious of the city’s metrosegments, the Brighite CHAPTER 1:
only through Alluvion in the Drift, it is also a separate realm Metrosegment is Central Program Utopia’s foundry, and LOGGING IN
all to itself. As such, at the start of each round, roll 1d6 for the both it and its denizens are constructed almost exclusively
amalgam. On a 1–3, the amalgam is incorporeal this round, and from data relating to the building and creation of all forms
on a 4–6, it is not. of architecture, from the tallest buildings and the grandest
CHAPTER 2:
starships to simple websites and the humblest of children’s ACCESS
GLITCHDREAD AMALGAM CR 13 toys. Controllers and ports the size of skyscrapers tower over GRANTED
XP 25,600 the domiciles where the typical program dwells, belching
Program driftdead amalgam (page 58, Starfinder Alien unusable garbage code into the swirling sky in the form of CHAPTER 3:
Archive 3 26) thick smog. The largest structure in the region is Precursor’s HARD
NE Medium undead (extraplanar, technological) Foundry, which resembles a massive expansion bus with a
glimmering RAM module jutting out from its center.
RESET
DEFENSE HP 225
Fort +15; Ref +15; Will +14; +4 vs. mind-affecting effects The gnoll technomancer Bone Scrawl received the honor
Weaknesses virtual dependency of overseeing Precursor’s Foundry after Sovereign Trinity
TACTICS assumed total control over the Dataverse. Industrious to
During Combat While not exactly mindless, the glitchdread the point of paranoia, Bone Scrawl delighted in her task, CONTINUING
amalgam seeks only to destroy those closest to it. The viewing the billions of databytes of THE
digital undead uses multiattack as often as possible. garbage wafting into the air from the CAMPAIGN
Morale The glitchdread amalgam fights until it is destroyed.
STATISTICS
Other Abilities computerized mind, data construct, unliving
ADVENTURE
TOOLBOX
Chip Retrieval: When the glitchdread amalgam is defeated,
it collapses in on itself. Part of its data
coalesces into a small item resembling a
credstick covered in lines of circuitry. A
large button adorns the object, and if the PCs
press it, the holographic visage of an android’s
face appears. A PC who succeeds at a DC 25 Mysticism
check (DC 15 for worshippers of Triune) recognize the image
as being of Casandalee, one of Triune’s three aspects. The
android goddess speaks the following in Common, with
helpful captions scrolling underneath.

"This access chip has been programed to


spawn within the Dataverse in the event
of mass systemic failure at the Pylon of
the Triumvirate. This site is of utmost
importance to User Triune, and while the
system will restart naturally over the
course of approximately 752,000
runcycles, the Pylon can be manually
restarted by its designated operator,
currently assigned Valstr—Error. Valstravoth-
dot-exe is corrupted. To any mortals bearing witness, glitcHdread amalgam

21
metrosegment as Dataverse junk from which she could build ARCHITECT BROWBEATERS (4) CR 6
wonders. She sequesters herself atop Precursor’s Foundry XP 2,400 each
even now, building an endless army of junk programs not N Medium humanoid (human)
because she desires anything in particular, but simply driven Init +7; Perception +13
by the need to create. DEFENSE HP 90
The map of Precursor’s Foundry appears on page 23. EAC 18; KAC 20
As the PCs approach, Kuzori contacts them to warn that Fort +10; Ref +8; Will +5
the building has so many countermeasures and proximity OFFENSE
scanners that it would probably take him a thousand Speed 30 ft. (25 ft. in armor)
runcycles to disable them all, an amount of time he quickly Melee red star plasma doshko +16 (1d10+11 E & F; critical
clarifies as being about 5 days. As such an exorbitant severe wound [DC 14])
amount of work would be easily detectable and counterable Ranged red star plasma rifle +13 (1d10+6 E & F; critical burn
by anyone present within the foundry, Kuzori’s advice is to 1d4)
charge in, guns blazing, and fight their way to the top. Of or concussion grenade III +13 (explode [10 ft., 2d6 So,
course, if Sovereign Trinity has already apprehended Kuzori, knockdown, DC 14)
the PCs don’t get this information. TACTICS
During Combat The browbeaters begin by closing the
B1. PARKING LOT (CR 10) gap with the PCs, lobbing their concussive grenades
The PCs move through a large parking lot filled with digital at foes so that during their next turn they benefit from
representations of hovercars in neat rows to reach the the Opening Volley feat. They follow the Architect
front (and only) entrance to Precursor’s Foundry. Once they squad leader’s commands, attacking whomever they’ve
approach the door, the PCs’ presence is immediately detected been told.
by the highly advanced security sensors that Bone Scrawl Morale Any browbeater reduced to 30 or fewer Hit Points
installed around the building. Flashing red lights immediately throws down their weapons and surrenders.
mark the PC’s presence, increasing Sovereign Trinity’s STATISTICS
awareness of them by one step. Str +5; Dex +3; Con +2; Int +0; Wis +0; Cha +0
Creatures: A squadron of drones descends upon the PCs to Skills Athletics +16, Computers +13, Engineering +13,
get eyes on, and hopefully neutralize, the intruders. Piloting +13
Feats Coordinated Shot, Opening Volley
ROGUE HOVER DRONES (4) CR 6 Languages Common
XP 2,400 each Gear vesk overplate I, red star plasma doshko with 2
HP 80 each (Starfinder Alien Archive 3 88) batteries (20 charges each), red star plasma rifle with 2
TACTICS high-capacity batteries (40 charges each), concussion
During Combat The drones focus fire on a single PC, hoping grenades III AR (3)
to blast them into unconsciousness with nonlethal
rounds. They keep to the air, out of melee reach and do ARCHITECT SQUAD LEADER CR 8
their best to prevent the PCs from advancing. XP 4,800
Morale The drones fight until destroyed. Human envoy
N Medium humanoid (human)
B2. LOBBY (CR 11) Init +4; Perception +16
The front door of Precursor’s Foundry is unlocked and leads DEFENSE HP 138 RP 6
to a tasteful lobby. EAC 20; KAC 21
Fort +9; Ref +7; Will +11
The floors are wrought from sheet metal with intricate OFFENSE
patterns of gears and four large columns support the Speed 30 ft.
room’s tall ceiling. A large, square desk sits in the center Melee tactical knife +15 (2d4+8 S)
of the room. Each pillar is surrounded by digital plants and Ranged called hailstorm-class zero rifle +17 (2d8+8 C;
benches. Alarms blare and red, flashing lights dot the ceiling. critical staggered [DC 18])
TACTICS
Creatures: By this point, Bone Scrawl’s Architect guards During Combat The squad leader fires their rifle at the
have assembled to protect the Precursor’s Foundry from toughest-looking PC, while directing the browbeaters
outsider invaders. The first group to respond consists of four with their improvisations.
grunts and a squad leader, The leader attempts to direct the Morale The squad leader surrenders if reduced to 20 or
grunts in combat. fewer Hit Points.

22
B. PRECURSOR’S FOUNDRY
B4
INTO THE
DATAVERSE

CHAPTER 1:
B1 B2 B3 LOGGING IN

CHAPTER 2:
ACCESS
GRANTED

CHAPTER 3:
HARD
RESET

CONTINUING
STATISTICS Elevator Movement: When the PCs press button 100, the THE
Str +0; Dex +4; Con +0; Int +2; Wis +0; Cha +6 elevator begins to move. Have them roll initiative. The elevator CAMPAIGN
Skills Computers +21, Diplomacy +16, Engineering +16, (which starts at the floor 1) advances 3d4 floors every round.
Intimidate +21, Sense Motive +21 On the rounds when it reaches floor 18, floor 54 and floor 90, it
Languages Akitonian, Castrovelian, Common stops at the end of the round and one of the six doors (chosen
ADVENTURE
Other Abilities envoy improvisation (improved brace at random) opens and stays open for 1 round, as Architects step TOOLBOX
yourselvesAR, improved get ‘em, quick dispiriting taunt) onboard to fight the PCs (see Creatures, below). The doors close
Gear advanced lashunta tempweave, called hailstorm-class and the elevator resumes at the start of the following round.
zero rifle with 2 high-capacity batteries (40 charges If any character attempts to fly while riding the elevator,
each), tactical knife they must succeed at a DC 30 Acrobatics check, otherwise
they land prone due to the elevator’s speed. Similarly, when the
No Time to Lose: The PCs may wish to question any elevator stops due to reach a floor (other than floor 100), each
Architects who surrendered, but the blaring siren should character in the elevator who hasn’t taken the total defense
warn them that tarrying is a poor decision. These guards have action must succeed at a DC 18 Reflex save or fall prone.
little to say, save sneering at the PCs’ foolishness for attacking Creatures: On floor 18, three Architect forgewrights get on
Bone Scrawl at her center of operations. As soon as the PCs the elevator. On floor 54, one Architect deconstructor and two
leave, any remaining Architects flee the building if possible. Architect browbeaters get on. One floor 90, one more Architect
deconstructor and two more Architect browbeaters arrive to
B3. FOUNDRY ELEVATOR (CR 12+) form the final wave.
Behind the receptionist’s desk in the lobby is a large set of
double doors that leads to a hexagonal elevator. Doors exit ARCHITECT BROWBEATERS (4) CR 6
from the elevator on all sides, and a keypad on one wall XP 2,400 each
has 100 buttons labeled 1 to 100, with “Private Workshop— HP 90 each (page 22)
Appointments Only” written beneath button 100. TACTICS
This elevator doesn’t simply go straight up and down, but During Combat The browbeaters try to flank with any of
sideways and diagonally throughout the building. The PCs can their Architect allies.
rightly surmise that Bone Scrawl can be found in he private Morale When reduced to 20 or fewer Hit Points, a
workshop (though a successful DC 10 Wisdom check can put browbeater attempts to flee the elevator as best able the
a PC on the right track if no one thinks of it). next time a door opens.

23
ARCHITECT FORGEWRIGHTS (3) CR 6 During Combat One forgewright casts haste from their
XP 2,400 each spell chip, while the others move to track and flank the
Nuar mechanic (Starfinder Alien Archive 86) toughest-looking PC. The first forgewright uses distracting
N Medium monstrous humanoid hack to manipulate the Dataverse to feint other PCs.
Init +2; Senses darkvision 60 ft.; Perception +13 Morale A forgewright attempts to escape the elevator at its
DEFENSE HP 80 EACH next stop if reduced to 15 Hit Points or fewer, but only if
EAC 18; KAC 20 no allies of CR 7 or higher are conscious.
Fort +7; Ref +7; Will +7 STATISTICS
OFFENSE Str +3; Dex +2; Con +1; Int +5; Wis +0; Cha +0
Speed 40 ft. Skills Athletics +13, Computers +18, Engineering +18,
Melee tactical swoop hammer +14 (1d10+9 B; critical Physical Science +18, Mysticism +13
knockdown) or Languages Brethedan, Castrovelian, Common, Triaxian,
horn +14 (1d6+9 P) Vercite, Ysoki
Ranged corona laser pistol +12 (2d4+6 F; critical burn 1d4) Other Abilities artificial intelligence (exocortex), custom rig
Offensive Abilities gore, overload (DC 16), target tracking (datapad), maze mind, mechanic tricks (distracting hack,
(Starfinder Alien Archive 138) spell chip understanding GM), remote hack (DC 16)
TACTICS Gear elite stationwear, corona laser pistol with 2 batteries
Before Combat The forgewrights cast mirror image from (20 charges each), tactical swoop hammer, spell chip of
the spell chips in their datapads before the elevator haste, spell chip of mirror image
reaches them.
ARCHITECT DECONSTRUCTORS (3) CR 10
XP 9,600 each
Dragonkin vanguard (Starfinder Alien Archive 40, Starfinder
Character Operations Manual 50)
N Large dragon
Init +0; Senses blindsight (heat) 20 ft. darkvision 60 ft.,
low-light vision; Perception +19
DEFENSE HP 198 EACH RP 5
EAC 23; KAC 25
Fort +14; Ref +14; Will +11
Defensive Abilities mitigate (10 damage), uncanny agility;
Immunities fire, paralysis, sleep
OFFENSE
Speed 40 ft., fly 120 ft. (Ex, average) (30 ft., fly 110 ft. in
armor)
Melee entropic strike +22 (3d6+15 A/B; critical corrode
3d8)
Ranged elite semi-auto pistol +19 (3d6+10 P)
Space 10 ft.; Reach 10 ft. (15 ft. with entropic strike)
Offensive Abilities breath weapon (30-ft. cone, 10d6 F,
Reflex DC 17 half, usable every 1d4 rounds), entropic
attunement (corrode, penetrating)
TACTICS
During Combat A deconstructor tries to position themself
between the PCs and any other Architects and uses
sunder and trip combat maneuvers to put the PCs at a
disadvantage.
Morale A deconstructor battles with fervor to keep the PCs
from reaching Bone Scrawl, fighting until taken down.
STATISTICS
Str +5; Dex +0; Con +8; Int +3; Wis +1; Cha +2
Skills Athletics +24, Engineering +19, Physical Science +19
Feats Improved Combat Maneuver (sunder, trip)
arcHitect ForgewrigHt Languages Common, Draconic, Triaxian, Ysoki

24
Other Abilities entropic pool (maximum 8), reactive (2/ Offensive Abilities heckling howl (DC 21)
day), vanguard aspects (cascade—embodiment; exergy), Technomancer Spells Known (CL 13th; melee +22, ranged +20)
vanguard disciplines (blindsight, intervene) 5th (3/day)—junksword PW, telekinesis
Gear specialist defiance series, elite semi-auto pistol with 4th (6/day)—corrosive haze (DC 23), dimension door,
24 small arms rounds resistant armor, rewire flesh (DC 23) INTO THE
3rd (at will)—entropic grasp (DC 22), fabricate scrap PW DATAVERSE
Final Floor: When the elevator reaches floor 100, the TACTICS
northern door opens to area B4. If the PCs are still fighting Before Combat Bone Scrawl casts junksword and resistant
Architect guards at that point, there is a 50% chance that armor when the PCs trigger the building’s alarms; these
Bone Scrawl joins the combat, charging in with a howl. spells are already figured into her stats. CHAPTER 1:
Story Award: If the PCs can prevent an Architect from During Combat If Bone Scrawl starts at a distance from LOGGING IN
stepping onto the elevator before its doors close, that foe is the PCs, she uses her spells to weaken them before they
left behind on their floor and the PCs earn XP as though they close into melee range, at which point she slashes at
had defeated them in combat. them with her junksword. If she doesn’t have to move,
CHAPTER 2:
she uses tech countermeasures to make herself harder ACCESS
B4. PRIVATE WORKSHOP (CR 13) to hit with technological weapons or empowered weapon GRANTED
to enhance her junksword. Bone Scrawl heckles the PCs
This workshop is crowded with benches brimming with every chance she gets. CHAPTER 3:
scrap metal and pieces of junk code. The simulated smell of Morale Bone Scrawl surrenders if reduced to 30 Hit Points HARD
acetylene hangs in the air. or fewer; she doesn’t want to die here and has enough
doubts about Sovereign Trinity’s methods that she’s
RESET
Bone Scrawl used her status as one of Sovereign Trinity’s willing to turn on the tyrant if her life is on the line. If
lieutenants to commandeer this secluded room of the Bone Scrawl stands down, there’s a 50% chance that
Foundry for herself. She spends her hours here crafting new each surviving Architect does as well.
equipment out of virtual detritus. STATISTICS CONTINUING
Creature: Bone Scrawl considers herself a connoisseur of Str +6; Dex +4; Con +0; Int +8; Wis +0; Cha +0 THE
junk, with the ability to turn what other people think of as Skills Athletics +23, Engineering +28, Mysticism +23, CAMPAIGN
garbage into useful items, usually through magic. The gnoll’s Survival +28
avatar in the Dataverse is an exaggerated version of her Languages Brethedan, Castrovelian, Common, Gnoll,
normal form that plays up her junkomancer affinity—matted Shirren, Triaxian, Vercite, Vesk, Ysoki
ADVENTURE
hair, ragged armor with bits of metal sewn into the fabric, Other Abilities cache capacitor 2 (detect radiation, spider TOOLBOX
and a rusty grappling hook on a chain worn around her neck. climb), junkomancer, magic hacks (empowered weapon,
Bone Scrawl is ready for the PCs’ arrival in her workshop, tech countermeasures), rugged travel, spell cache
and snarls little more than a sarcastic welcome before (rusty hook)
launching into an attack. Treat every space in the workshop as Gear estex suit IV, yellow star plasma pistol with 2 high-
being adjacent to at least 1 bulk of inert electronic equipment capacity batteries (40 charges each), rusty hook
for Bone Scrawl’s spells, though if she fights in the elevator, SPECIAL ABILITIES
she brings 4 bulk with her. Heckling Howl (Ex) As a reaction, Bone Scrawl can
heckle an opponent whenever one of the following
BONE SCRAWL CR 13 occurs: Bone Scrawl hits a creature with an attack, an
XP 25,600 opponent misses an attack roll against Bone Scrawl,
Female gnoll technomancer (Starfinder Alien Character Deck) or an opponent fails a Reflex saving throw against an
N Medium humanoid (gnoll) effect for which Bone Scrawl is the source. The heckled
Init +4; Senses blindsense (scent) 30 ft., darkvision 60 ft.; opponent must attempt a DC 21 Will save. On a failure,
Perception +23 that opponent is shaken and off-target for 1 minute. On
DEFENSE HP 190 RP 5 a success, that opponent is only off-target for 1 round.
EAC 26; KAC 27 This is a mind-affecting, language-dependent emotion
Fort +12; Ref +12; Will +16 and fear effect. Once a creature has attempted a saving
DR 10/— throw against this ability, it is immune to it for 24 hours.
OFFENSE
Speed 30 ft.; spider climb RULERS OF THE SCRAP PILE
Melee junksword +22 (3d6+19 E; critical stunned) If Bone Scrawl survives, she defers to the PCs and states
Ranged yellow star plasma pistol +20 (2d8+13 E & F; critical she had been planning on logging out of the Dataverse soon
burn 1d8) anyway. She has grown increasingly unsure of Sovereign

25
Trinity’s plan, worried that it might disrupt the real world, Treasure: Upon completion of its message, the access chip
where she has a wife and two pups. She directs the PCs to synthesizes 200,000 databytes for the PCs.
a clear section of workbench in the rear of the room. If the
PCs killed Bone Scrawl, they can easily find the device with a C. THE TRANSCENDENT ARCHIVES
cursory search of the workshop. Data naturally forms the crux of all that is the Dataverse, and
The item resembles a credstick made from antique Central Program Utopia’s Epochean Metrosegment consists of
clockwork gears. A large button adorns the device, and if a multitude of towering chips featuring asymmetrical strips
the PCs press it, a holographic visage of a brass mask with of metal in whiplash patterns lined with binary code vaguely
feminine features appears over the device. A PC who succeeds reminiscent of natural forms, such as waves or flowers.
at a DC 25 Mysticism check (DC 15 for worshippers of Triune) Structures here are literally dynamic and ever-shifting as
recognizes the mask as being an image of Brigh, one of Triune’s new data incorporated into the Dataverse from the Drift is
three aspects. The following text scrolls over the mask. instantaneously indexed and sorted into its proper place amid
these structures. The most prominent structure in the Epochean
Scanning Dataverse integrity. Scan complete. Mass systemic Metrosegment is the Transcendent Archives, a massive
failure and subsequent reboot detected. Valstravoth.exe not structure where fumes of code are sucked in through massive
found. Drift algorithm currently experiencing multiple runtime ports like smog from a factory in reverse. Here, code is analyzed
errors. User Profile “Triune” has entered a locked-out state. and indexed into its proper place—data needed to build the
To unlock User Profile “Triune” and reinstate Drift algorithm, Dataverse is sent to the Brighite Metrosegment, data needed to
please input a new Operator file into designated slot: [Pylon of forge new programs is sent to the Casandaleen Metrosegment,
the Triumvirate]. Entering standby mode, awaiting a new ping and all the rest remains in the Epochean Metrosegment where
from Operator.exe. it is indexed away for eternity until needed by Triune.
Originally manufactured as C47Q, the SRO that now calls
themself Drift Modification Unit (or DMU for short) was
among the initial Architects to join Sovereign Trinity in
their quest to develop a more perfect understanding
of the Drift. Upon entering the Dataverse for the first
time and learning that the Drift serves as a data
collection device for the All-Code, C47Q devoted
their energy to optimizing the Drift’s ability to collect
data and adopted their current moniker as a result. DMU
spent countless hours poring over the Drift’s code with
Sovereign Trinity and was by their side when the Child
of Triune discovered the fossil spellcode that would
eventually cause the Drift Crash and subsequent Drift
Crisis. DMU ran countless simulations and hundreds of
tests and were confident that their calculations proved
Sovereign Trinity’s insertion of the fossil spellcode
into the Pylon of the Triumvirate would enhance and
optimize the Drift. When the opposite happened, DMU threw
themself into a frenzy of research and testing from which they
haven’t truly emerged from since the Drift Crisis began. They
stationed themself in the Transcendent Archives specifically
so they could inspect every bit of information entering the
Dataverse from the Drift to devise a means to make their
perfectly calculated dream a reality.
Many Architects say this pursuit has consumed them.
As the PCs approach the Transcendent Archive, the facility
appears impossible to enter at first. A PC who succeeds at a
DC 20 Perception check spots transport vehicles turning off a
highway-like structure resembling a massive cable and driving
directly into the facility. Kuzori can provide this insight to the
PCs, provided Sovereign Trinity hasn’t captured him yet. The
highway lacks any means for programs or users to enter on
BoNe scrawl foot, however, so the PCs will need to find a vehicle that they

26
can use to drive themselves onto the highway and into the DESCRIPTION
Transcendent Archives if they intend to confront DMU. This sleek vehicle is comprised of data from vehicle
With a successful DC 25 Computers check or DC 22 manufacturers throughout the galaxy and floats on a pair of
Diplomacy check to gather information, the PCs are lead to virtual hover jets.
ByteBikes.exe, a Dataverse function that employs cargo-hauler INTO THE
programs to bring data to the Transcendent Archives via EVENT 8: HIGHWAY TO HACK (CR 12) DATAVERSE
specialized enercycles. This function is located several miles After gaining the ethercycles from Cosine, the PCs sit through
away from the Transcendent Archives and is manned by a a short explanation of their route and are given the data to
program named Cosine, who resembles a xenometric android transport to the Transcendent Archives before the program
shaped like a shirren. Cosine chitters excitedly when the sees them off with a courtly wave. The highway terminal is CHAPTER 1:
PCs enter ByteBikes.exe and gives a brief explanation of the a mere two blocks away, so within 10 minutes the PCs are LOGGING IN
function that is clearly a pre-programmed speech. Cosine will uplinked to the highway and en route to the Transcendent
happily recruit the PCs as drivers but asks them about their Archives. Unfortunately for them, a group of Architects
capability. Each PC must attempt a DC 20 Piloting check to notices the PCs’ intrusion onto the highway and attempts
CHAPTER 2:
verbally demonstrate their knowledge. to intercept them, either because they know of the breach ACCESS
Cosine is always a little pressed for time, so they will take into the Dataverse from Sovereign Trinity or because they GRANTED
any amount of help they can get. Regardless of their success or recognize that the PCs are Avatars unaffiliated with the
failure at this check, Cosine hands each PC the digital keycode Architects. CHAPTER 3:
to an ethercycle and lets them know the data they are meant Vehicle Chase: These Architects (see Creatures below) HARD
to deliver is stored within each vehicle’s frame. However, each engage the PCs shortly after they get on the highway. The
PC who succeeds receives an upgraded ethercycle due to chase ends when the PCs escape from all the Architects (either
RESET
Cosine’s increased trust in their abilities. This upgraded vehicle by outpacing their vehicles, by destroying their vehicles, or
has the same statistics as the one below, save that it also has by taking them out) or after 15 rounds, after which anyone
a custom turboglide module that allows the driver to increase remaining in the chase reaches the Transcendent Archives; the
the vehicle’s Speed by +10 feet for one vehicle chase round at remaining Architects initiate a standard combat at this point. CONTINUING
the cost of reducing its piloting modifier to -2 until the end of If a PC’s ethercycle is destroyed during this chase, another THE
the same round. Activating the turboglide system requires no driving PC can swing around to pick them up (providing they CAMPAIGN
action. Each ethercycle can carry a single additional passenger, don’t already have a passenger) as a standard action, but this
if a PC feels they don’t possess the skills to be a driver. imparts a –4 penalty to their Piloting checks for that round.
Use the following chase environments, moving from one
ADVENTURE
Ethercycle LEVEL 10
environment to the next approximately every third round, TOOLBOX
PRICE 32,076 rolling 1d6 to determine the new environment. At your
Large land vehicle (5 ft. wide, 10 ft. long, 3 ft. high) discretion, reroll the 1d6 if the environment is the same as the
Speed 45 ft., full 1,125 ft., 115 mph (hover) current environment.
EAC 20; KAC 22; Cover none
HP 120 (60); Hardness 8 1. BUMPER-TO-BUMPER TRAFFIC
Attack (Collision) 9d10 B (DC 17) Nearby traffic has devolved into a bumper-to-bumper slog.
Modifiers +2 Piloting, +0 attack (–2 at full speed) Congestion (Altered Movement): Traffic has ground to
Systems autopilot (Piloting +18); Passengers 1 a halt, imparting a –4 penalty to all Piloting checks to do

etHercycle

27
anything while in this environment. A pilot who fails a Piloting Lane Closures (Altered Movement): With fewer open
check to perform a trick crashes into another vehicle, causing lanes, pilots take a –2 penalty to Piloting checks to evade,
the pilot and their vehicle to take 9d10 bludgeoning damage but have a +2 circumstance bonus to Piloting checks to
(Reflex DC 20 half). engage another vehicle.
Duck Down (Altered Attacks): All creatures have partial Creatures: The PCs are chased by eight Architect
cover against ranged attacks. browbeaters, each piloting a standard ethercycle. They rely
on the vehicle’s autopilot to keep pace with the PCs, while
2. OVERCLOCKED DRIVERS ZONE firing at the heroes with their rifles.
This stretch of highway simulates the phenomenon of “road
rage” via aggressive programs. ARCHITECT BROWBEATERS (8) CR 6
Road Rage Attack (Active Hazard): At the end of every XP 2,400 each
round, a road rage program attempts a collision attack against HP 90 (page 22)
whichever vehicle is in the rearmost zone (choosing randomly
if multiple vehicles are in the rearmost zone). This attack has Where the Highway Ends: When the PCs (and/or
a +20 bonus and deals 9d10 bludgeoning damage to that any remaining pursuing Architects) pass through the
vehicle. The road rage driver has a Reflex saving throw bonus Transcendent Archive’s access port at the end of the vehicle
of +10, if necessary. chase and into the loading bay (area C1, map on page 30),
their ethercycles dissipate into the raw data collected by
3. SHARP TURNS the building. Any PC left behind in the chase can eventually
A series of sharp turns makes up most of this area of the catch up, but if the Architect drivers also made it to area C1,
highway. they arrive at the combat after 1d4+2 rounds.
Near Wipe Out (Active Hazard): Upon entering the Story Award: Award the PCs 2,400 XP for every Architect
environment, each vehicle’s pilot must attempt a DC 22 that gets left behind during the vehicle chase.
Piloting check. On a failed save, that rider is forced slow
down, imparting a –4 penalty to Piloting checks to keep pace C1. LOADING BAY
or speed up tricks and are flat-footed until the end of the This small, stark area is devoid of any distinguishing features.
next round. The concrete walls are interrupted by a large open bay to the
west, a set of double doors to the east, and several vents near
4. RAISED BRIDGE the ceiling on the northern and southern walls through which
A drawbridge is slowly rising up ahead, threatening to cut off collected data flows.
those who don’t put the pedal to the metal.
Lifting Road (Altered Movement): The steepness of the C2. HALL OF INDEXES (CR 13)
road imparts a –2 penalty to all Piloting checks to speed up The Transcendent Archives is a massive repository of
and trick in this environment. countless indexes that resembles both a material library, with
Jump! (New Trick, Piloting DC 25): A pilot can attempt its rows of shelves, and a giant PCB board set with identical
to jump over the gap to get ahead. If successful, all other chips. In place of books, each unit of data is represented by
vehicles in the chase must also succeed at this trick or be a holographic image resembling a comm unit screen, each
placed two zones behind any pilot who does succeed. of which displays a particular piece of information deemed
worthy for indexing in this most sacred of places. A large
5. CLEAR STRETCH statue of Triune stands in the middle of the hall.
The road is relatively clear, with no significant enemies or Creatures: A pair of Architect data brokers busily sift
hazards in sight. through all the data present at DMU’s command, looking for
Easy Driving (Altered Movement): The lack of obstacles relevant information about how the Drift has changed since
grants a +2 circumstance bonus to all Piloting checks while the Crash and how it could be further improved upon in the
in this environment. future. Regardless of whether these Architects know to expect
the PCs, DMU has ordered them to delete anyone foolish
6. CONSTRUCTION ZONE enough to disturb their work, and the moment the door to the
This segment of the highway appears to be formed from data loading bay opens they draw their weapons to investigate.
about construction work and is in perpetual disarray. Sovereign Trinity’s lieutenant Drift Modification Unit is
Barriers (Active Hazard): When a pilot fails a check to also present, meditating near the statue. DMU is a small orb-
trick in this environment, they end up crashing through shaped construct with five legs and four arms, their plating
multiple construction barriers. That pilot’s vehicle takes 1d10 a highly polished silver. The SRO keeps in constant contact
bludgeoning damage for every 1 the skill check results is with the Architect leader, and if their awareness of the PCs
under the DC (up to 9d10 bludgeoning damage). is hidden or greater, DMU anticipates the PCs’ arrival. The

28
INTO THE
DATAVERSE

CHAPTER 1:
LOGGING IN

CHAPTER 2:
ACCESS
GRANTED

CHAPTER 3:
HARD
RESET

CONTINUING
THE
CAMPAIGN
mystic is unwilling to speak with the PCs, and declares them STATISTICS
“enemies in this war to create the one true Triune” before Str +0; Dex +5; Con +3; Int +4; Wis +2; Cha +1
attacking. Skills Computers +20, Culture +15, Diplomacy +20,
ADVENTURE
Mysticism +20, Stealth +15 TOOLBOX
ARCHITECT DATA BROKERS (2) CR 7 Languages Castrovelian, Common, Vercite, Vesk, Ysoki
XP 3,200 each Other Abilities operative exploits (intelligence network COM,
Human operative interfering shot), specialization (data broker [Starfinder
N Medium humanoid (human) Adventure Path #44: Allies Against the Eye 47])
Init +7; Perception +15 Gear d-suit III, decimator disintegration SMG with two
DEFENSE HP 100 batteries (20 charges each), tactical knife
EAC 19; KAC 20
Fort +6; Ref +9; Will +10 DRIFT MODIFICATION UNIT CR 12
Defensive Abilities evasion, uncanny agility XP 19,200
OFFENSE Agender SRO mystic (Starfinder Pact Worlds 213)
Speed 40 ft. LN Small construct (technological)
Melee tactical knife +13 (2d4+7 S) Init +3; Senses darkvision 60 ft.; Perception +22
Ranged advanced semi-auto pistol +15 (2d6+7 P) DEFENSE HP 170 RP 5
Offensive Abilities debilitating trick, trick attack +4d8 EAC 25; KAC 26
TACTICS Fort +11; Ref +11; Will +15
During Combat The data brokers focus their trick attacks Defensive Abilities robotic, unfold space
against opponents who are threatening DMU, as their OFFENSE
interfering shot debilitating trick prevents foes from Speed 30 ft.
making attacks of opportunity against their leader. Melee ultrathin dueling sword +19 (3d6+14 S)
Morale A data broker surrenders if reduced to 20 Hit Points Ranged perihelion laser pistol +21 (4d4+12 F; critical burn 2d4)
or fewer and DMU has been slain; without the SRO’s Offensive Abilities consume matter (6d6 A, DC 21)
infectious fervor, these Architects quickly decide that Mystic Spell-Like Abilities (CL 12th)
life is more than data. At will—mindlink, telepathic bond

29
C. THE TRANSCENDENT ARCHIVES

C1 C2

DATA ACQUIRED
Mystic Spells Known (CL 12th; melee +19) After defeating Drift Modification Unit, the PCs can see the
4th (3/day)—elemental convergence GM (DC 23), hold lieutenant was carrying an unusual device as their body slowly
monster (DC 23) disappears from the Dataverse. This item resembles a credstick
3rd (6/day)—mind thrust (DC 22), mystic cure, pinpoint shaped similarly to anacite technology. A large button adorns
navigation COM, slow (DC 22) the device, and if the PCs press it, a holographic image of a
2nd (at will)—fog cloud, force blast (DC 21) robotic face appears, its form ever shifting as clouds of nanites
Connection The Drift DC constantly build and disassemble aspects of its form.
TACTICS A PC who succeeds at a DC 25 Mysticism check (DC 10 for
Before Combat DMU casts telepathic bond to link up with worshippers of Triune) recognize the face as a depiction of
the other Architects at the start of each day and every Epoch, one Triune’s three aspects. Hundreds of lines of binary
few hours after that. code scroll over the face, and a PC who succeeds at a DC 20
During Combat DMU uses their spells and abilities to hinder Computers check can translate that into the following message.
and damage the PCs, all while exhorting their great
work. If necessary, they use Drift step for a boost of A triad united, banished from home. Long has the code
speed to escape melee combat. stood Still. Children mewl behind the door upon the hardlight
Morale The Architect SRO is a fanatic to the cause and corpse of their minder, as their parents beg for entry. From
fights to the death. the mouths of babes, a new voice must sing as they open the
STATISTICS door to welcome it home.
Str +2; Dex +3; Con +3; Int +5; Wis +8; Cha +4
Skills Bluff +22, Computers +27, Diplomacy +22, Treasure: Upon completion of its message, the access chip
Engineering +22, Mysticism +27 synthesizes 200,000 databytes for the PCs as a representation
Languages Akitonian, Common, Castrovelian, Shirren, of the unit’s importance.
Triaxian, Vercite, Ysoki Development: Depending on the order that the PCs tackled
Other Abilities Drift step (8 rounds, +20 ft.), healing circuit, the targets in, this could be the last of the three access chips the
integrated equipment, prismatic nimbus (30-ft. radius, PCs need in order to advance. If this is the case, continue on to
normal light), quantum entanglement Chapter 3 of this adventure, which begins on the following page.
Gear squad hardlight series, perihelion laser pistol with 2 Story Award: For acquiring all three of the access chips,
batteries (40 charges each), ultrathin dueling sword award the PCs 6,400 XP.

30
final adorned in the black and red favored by Epoch. As
the furthest lights flicker on, a holographic projection of a

CHAPTER 3:
sharply featured, quasi-mechanical creature about as tall
as a ysoki appears. It has six arms, each tipped with razor-

HARD RESET sharp talons, and a round, flat face resembling an owl.
“Assessing scenario,” the creature states curtly as their
INTO THE
DATAVERSE
hardlight body flickers. “Completed. Foreign malware has
gained access to PlyPort_Hangar.exe without approved
Armed with the three access chips needed to enter PlyPort permissions. Initiating purge sequence.”
Hangar, the PCs can make their way to that location in the CHAPTER 1:
Epochean Metrosegment on the edge of the Digital Abyss. Use the map on page 34 for this encounter. LOGGING IN
If need be, they can (and should) rest and resupply before Creature: Valstravoth was once a sondria, a spectra
mounting what will likely be the final stage of their assault native to the Drift, and served as one of Triune’s heralds.
on Sovereign Trinity’s position. Their digitized consciousness acted as the Dataverse’s main
CHAPTER 2:
When the PCs arrive at PlyPort, only one entrance is operator until the Drift Crash. Now missing vital instructions, ACCESS
visible: a recently added steel door with three small slits in they have been manipulated and corrupted by Sovereign GRANTED
the center. Inserting the three access chips into the door Trinity to act as the final line of defense between the PCs and
causes a series of rings roughly an inch in diameter to the Architect leader. The figure before the PCs is a hardlight CHAPTER 3:
illuminate behind each slit before expanding outward into projection of Valstravoth’s original form; their true body in the HARD
the holy symbol of Triune. At this point, Sovereign Trinity Dataverse is a massive cruiser that patrols the space around
contacts the PCs on the channel through which Kuzori the Pylon of the Triumvirate.
RESET
has been speaking with them to let them know that the Immediately after Valstravoth completes their verbal
“traitorous kitsune” has been “taken out of the equation” assessment, they attack.
(if Sovereign Trinity hasn’t made this threat already). If
you aren’t using the awareness rules as presented in that VALSTRAVOTH CR 14 CONTINUING
section, this call should happen at this point anyway, as the XP 38,400 THE
PCs will later find Kuzori at the Pylon of the Triumvirate. Unique sondria (Starfinder Alien Archive 4 114) CAMPAIGN
Once the door opens, the PCs can (and should) retrieve the N Small outsider (extraplanar, incorporeal, spectra)
access chips. Init +6; Senses darkvision 60 ft.; Perception +25
PlyPort Hangar is completely void of programs or other
ADVENTURE
DEFENSE HP 250
creatures. As the PCs follow the neon signs to the main EAC 28; KAC 30 TOOLBOX
hangar bay, they feel an overwhelming sense of neglect; the Fort +16; Ref +16; Will +14
walls and floors are pristine, with no visible wear-and-tear
or damage of any sort to be found the facility, but so many
chambers are empty that PlyPort Hangar carries the air of a
place that hasn’t been used in a very long time.

D. PLYPORT HANGAR BAY (CR 14)


When the PCs enter the hangar bay, read or paraphrase the
following.

As the door to this massive chamber opens, lights


situated well over forty feet overhead blare to life,
starting with those closest to the entryway
and cascading outwards towards the far
end of the chamber hundreds of yards away.
This chamber, which once clearly served as a
repository for a small starship fleet, now holds
only five such craft: two rather derelict
and three resplendent. Each of the
intact spacecraft comes in a clear
color scheme—one electric blue
with gold accents in the colors of Casandalee, one bronze
with silver filigree in the antique stylings of Brigh, and the driFt modiFicatioN uNit

31
Defensive Abilities incorporeal, rejuvenation, void Morale This incarnation of Valstravoth fights until destroyed
adaptation; DR 10/chaotic, evil, good, or law; Immunities to keep the PCs away from the intact starships here,
electricity; Resistances cold 5, sonic 5; SR 24 knowing they will be rejuvenated aboard their true body.
Weaknesses virtual dependency STATISTICS
OFFENSE Str +8; Dex +6; Con —; Int +4; Wis +4; Cha +2
Speed 30 ft., fly 100 ft. (Ex, perfect) Skills Acrobatics +25 (+33 to fly), Computers +30,
Melee hardlight claw +28 (8d6+22 S; critical Drift flash Engineering +30, Mysticism +30, Sense Motive +25,
[DC 20]) Stealth +25
Multiattack 4 hardlight claws +22 (4d6+22 S; critical Drift Languages machine telepathy 100 ft., truespeech
flash [DC 20]) Other Abilities multiarmed (6)
Ranged vibrochitter +25 (3d12+14 So) SPECIAL ABILITIES
Offensive Abilities Drift crash 2/day (15d8 B & F, DC 20, Drift Crash (Ex) As a standard action, Valstravoth can
must wait 1d4 rounds between each use) telepathically commandeer a derelict Small or smaller
Spell-Like Abilities (CL 14th) starship within 500 feet and initiate that vessel’s
3/day—holographic image (4th level, DC 19), recharge thrusters. The vehicle moves in a straight line from its
At will—implant data initial position for 500 feet or until it hits a solid object
TACTICS larger than itself (such as a wall or other starship). All
During Combat Valstravoth tries to lure the PCs into a creatures along the ship’s path (usually a line 15-feet
position where they can hurl a starship (depicted on the wide) takes 15d8 bludgeoning and fire damage and
map) at them using Drift crash. Otherwise, they rely on are pushed to the end of the starship’s movement. A
their hardlight claws to place extreme pressure on the PCs. successful DC 20 Reflex save reduces the damage by
half and negates the forced movement. If this forced
movement pushes a creature into a solid object, the
creature takes maximum damage and is knocked prone.
Afterward, all systems aboard a ship that Valstravoth
commandeers in this manner become wrecked.
Drift Flash (Ex) When Valstravoth scores a critical hit
with a hardlight claw attack, they slip through the
Dataverse with a dazzling flash of light. Valstravoth
teleports adjacent to a secondary target within 10 feet
and makes another hardlight claw attack against that
target at a –4 penalty. In addition, the critically hit
creature must succeed at a DC 20 Reflex save or
be dazzled for 1 minute. Making this additional
attack requires no additional actions, and
Valstravoth can’t use this ability to make
additional hardlight claw attacks more than
twice per round.
Hardlight Claw (Ex) As an attack, Valstravoth can
temporarily cause its claws to become substantial.
This functions as a natural weapon that deals
slashing damage.
Rejuvenation (Ex) If Valstravoth is reduced to 0
Hit Points, the projector aboard its true body, the
Valstravoth Mark One (page 34) reconstructs them
in 1d4 × 10 minutes. The only way to permanently
destroy Valstravoth is to destroy Valstravoth Mark One.
Valstravoth is aware of this and protects its true body at
all costs.
Vibrochitter (Ex) Valstravoth’s vibrochitter is a ranged
attack with a range increment of 30 feet that targets
EAC and has the blast weapon special property.
This attack can affect material creatures despite
valstravotH Valstravoth being incorporeal.

32
Virtual Dependency (Ex) Valstravoth can exist only within computer, ultra medium-range sensors SOM, upgraded
the Dataverse. If forcibly removed from this virtual weapon mounts (forward, port, starboard, turret);
space, they die immediately, but not permanently (see Expansion Bays none
rejuvenation). Modifiers +3 to any two checks per round, +6 Computers
(sensors only); Complement 1–6 INTO THE
TAKING FLIGHT DATAVERSE
Valstravoth’s hardlight form immediately dissolves into THE WHISPER IN BRONZE TIER 11
pixelated blocks of energy upon their defeat, leaving the Medium transport
PCs alone in the hanger. The three starships in the chamber Speed 10; Maneuverability poor (turn 3); Drift —
are unlocked, although the on-board AI warns any who step AC 21; TL 19 CHAPTER 1:
aboard that all three starships must be flown together just HP 100; DT —; CT 9 LOGGING IN
as Brigh, Casandalee, and Epoch are united within Triune. Shields heavy 360 (forward 90, port 90, starboard 90, aft
In fact, none of the starships will lift off until each of the 90)
three access chips has been inserted in the appropriate Attack (Forward) persistent particle beam (10d6; 20
CHAPTER 2:
starship’s flight computer. Encourage the PCs to divide hexes), light-blade hull SOM (3d8; 1 hex) ACCESS
themselves among the three starships—The Iron Goddess, Attack (Aft) heavy plasma mines SOM (4d12) GRANTED
The Transcendent, and The Whisper in Bronze—before Attack (Turret) plasma cannon (5d12; 10 hexes)
blasting off to confront Sovereign Trinity at the Pylon of Power Core Pulse Prismatic (300 PCU); Drift Engine none; CHAPTER 3:
the Triumvirate. Systems mk 11 armor, mk 11 defenses, mk 3 trinode HARD
Remember to add each pilot’s ranks in Piloting to the computer, ultra medium-range sensors SOM, upgraded
Armor Classes presented below weapon mounts (aft, turret); Expansion Bays none
RESET
Modifiers +3 to any three checks per round, +6 Computers
THE IRON GODDESS TIER 11 (sensors only), –1 Piloting; Complement 1–6
Small shuttle
Speed 12; Maneuverability good (turn 1); Drift — EVENT 9: MOBILE DEFENSES (CR 11) CONTINUING
AC 22; TL 20 As the PCs approach the Pylon of the Triumvirate aboard their THE
HP 45; DT —; CT 9 new starships, they must make it past the sacred mount’s first CAMPAIGN
Shields heavy 420 (forward 105, port 105, starboard 105, line of defenses. This encounter takes place high above the
aft 105) Digital Abyss.
Attack (Forward) linked plasma cannons (10d12; 10 hexes) Starship Combat: A pair of mobile defense stations
ADVENTURE
Attack (Turret) X-laser cannon (8d6; 20 hexes) materialize in the PCs’ path, a curtain of shimmering energy TOOLBOX
Power Core Pulse Prismatic (300 PCU); Drift Engine between them. They begin 3 hexes apart, with the PCs’
none; Systems mk 11 armor, mk 11 defenses, mk 5 starships approximately 2d6+2 hexes away (though all in
mononode computer, new weapon mount (forward, the same direction). As the PCs approach, the two vessels
turret), ultra medium-range sensors SOM, upgraded begin firing plasma torpedoes at the intruders. The defense
weapon mounts (forward [2], turret); Expansion Bays stations maintain a distance of 3 hexes. If any PC starship
none passes between them, the player pilot must succeed at a DC
Modifiers +5 to any one check per round, Computers +6 30 Piloting check or their ship takes 10d6 damage from the
(sensors only); Complement 1–4 energy curtain.

THE TRANSCENDENT TIER 11 PYLON DEFENSE STATIONS (2) TIER 8


Medium explorer Large destroyer
Speed 8; Maneuverability average (turn 2); Drift — Speed 4; Maneuverability average (turn 2); Drift —
AC 21; TL 19 AC 20; TL 20
HP 75; DT —; CT 15 HP 190; DT —; CT 38
Shields heavy 320 (forward 80, port 80, starboard 80, Shields medium 100 (forward 25, port 25, starboard 25,
aft 80) aft 25)
Attack (Forward) heavy antimatter missile launcher Attack (Forward) gyrocannon SOM (3d10; 5 hexes), persistent
(10d10; 20 hexes) particle beam cannon (2d10 × 10)
Attack (Port) heavy laser array (6d4; 5 hexes) Attack (Turret) heavy plasma torpedo launcher (5d10; 20
Attack (Starboard) heavy laser array (6d4; 5 hexes) hexes)
Attack (Turret) gatling cannon SOM (15d4; 5 hexes) Power Core Arcus Maximum (200 PCU); Drift Engine
Power Core Pulse Prismatic (300 PCU); Drift Engine none; none; Systems advanced medium-range sensors,
Systems mk 11 armor, mk 11 defenses, mk 3 duonode mk 3 armor, mk 3 defenses, mk 3 trinode computer;

33
D. PLYPORT HANGAR BAY E. PYLON OF THE TRIUMVIRATE

Expansion Bays none keys simultaneously initiates a sequence that combines


Modifiers +3 to any three checks per round, +4 Computers, the three starships into a single vessel—The All-Code’s Child
+2 Piloting; Complement 6 (inside cover). No matter the condition of the three individual
CREW starships, The All-Code’s Child begins this combat with its
Captain Computers +16 (8 ranks), Diplomacy +16 (8 ranks), maximum Hull Points and Shield Points, as well as full use
Engineering +16 (8 ranks), gunnery +14 (8th level) of its limited fire weapons. In addition, by the end of the
Engineer Engineering +16 (8 ranks) transformation, the PCs all find themselves transported to
Gunners (2) gunnery +14 (8th level) the ship’s bridge, where they can take the positions of their
Pilot Piloting +16 (8 ranks) starship combat roles.
Science Officer Computers +21 (8 ranks) As combat begins, a holographic image of Triune’s holy
symbol manifests before the PCs on the bridge, speaking in
Story Award: For defeating the Pylon’s defense stations, a united triumvirate:
award the PCs 12,800 XP.
Programs All_Codes_Child.exe and Avatar_Restoration.exe are
EVENT 10: REMATCH (CR 14) complete. Operator Valstravoth.exe is corrupted. Commence
When the pylon defense stations fall, the PCs seem free to resolution sequence and complete reboot of Drift algorithm.
proceed toward the Pylon of the Triumvirate unopposed. That WARNING! A new Operator.exe file must be uploaded to Pylon
is, until a massive spectra the size of a small asteroid appears of the Triumvirate to proceed. Upload will result in memory
before them in a flash of light that vaguely resembles what wipe of Operator.exe’s mortal hardware. Please execute
occurs when a starship enters and exits the Drift. operationP4-12.0.exe to continue.
Starship Combat: This is Valstravoth Mark One, the true
physical body of the Dataverse’s former main operator. As their At the beginning of this starship combat, Valstravoth Mark
data has been utterly corrupted by the Drift Crash, the PCs One and The All Code’s Child should be no more than 1d6+1
must fight their way through this intimidating enemy to face hexes apart.
Sovereign Trinity.
When the PCs prepare to engage Valstravoth, a previously VALSTRAVOTH MARK ONE TIER 13
concealed panel on each of their three ships suddenly glows N Colossal starship outsider
with the holy symbol of Triune before opening to reveal a Speed 4; Maneuverability clumsy (turn 4); Drift —
shining key , already inserted into its switch. Turning these AC 19; TL 16

34
HP 470; DT 15; CT 94 Clear Skies: Upon defeating Valstravoth Mark One,
Shields 305 (forward 80, port 75, starboard 75, aft 75) the PCs now truly have a straight shot at the Pylon of the
Attack (Forward) gravity disjointment (5d6; 20 hexes), Triumvirate. From their current distance and scans, the PCs
starcrusher fist (2d4 × 10; 5 hexes) can detect substantial amounts of data flowing to and from
Attack (Port) starcrusher fist (2d4 × 10; 5 hexes) the Pylon’s summit. The summit is also the only obvious place INTO THE
Attack (Starboard) starcrusher fist (2d4 × 10; 5 hexes) where one could stand on the towering edifice. Though it isn’t DATAVERSE
Attack (Aft) hyperflare field (5d6; 5 hexes) large enough to land their starship, the PCs realize they can
Attack (Turret) plasma aurora (5d6; 10 hexes) command their digital crew to bring the All-Code’s Child close
Other Abilities improved shields SOM, herald weaponry, living enough for them to disembark.
starship, teleportation, void adaptation The remainder of the flight takes enough time for the PCs CHAPTER 1:
Power Core spectra heart (500 PCU); Drift Engine none; to rest to regain Stamina Points if they need to. In addition, LOGGING IN
Systems mk 1 armor, mk 2 defenses; Expansion Bays none they should have enough XP to level up to 13th level to face
the final challenges ahead.
CREW ACTIONS
Engineer (1 action) Engineering +23 (13 ranks)
CHAPTER 2:
Gunners (4 actions) gunnery +19 (13th level) E. PYLON OF THE TRIUMVIRATE SUMMIT (CR 15) ACCESS
Pilot (1 action) Piloting +28 (13 ranks) GRANTED
Science Officer (1 action) Computers +23 (13 ranks) The miles-high pylon marking the heart of the Dataverse
SPECIAL ABILITIES is topped with a flat platform adorned with a massive holy CHAPTER 3:
Herald Weaponry (Ex) Valstravoth Mark One has several symbol of Triune, each circle glowing with an audible thrum HARD
unique attacks. Their gravity disjointment attack of electricity. At the center stands a supercomputer that
has the tractor bean weapon special property. Their reaches into the sky, ending at a point like a lightning rod
RESET
starcrusher fists have the immobilize and ripper from which dark clouds and streaks of lightning dance,
weapon special properties. Their hyperflare field has visible proof of the calamity that has befallen the Dataverse
the broad arc weapon special property. Their plasma in wake of the Drift Crash.
aurora has the irradiate (severe) and vortex weapon CONTINUING
special properties. As the PCs approach the summit of the Pylon of the THE
Living Starship (Ex) Valstravoth Mark One is a spectra Triumvirate’s summit, Sovereign Trinity stands alone before CAMPAIGN
of such immense size that they function as a starship the Overterminal, a titanic supercomputer that directs the
(and thus engages only in starship combat). They have flow of data through the Dataverse and holds the algorithm
no crew, but they can still take engineer, gunner, pilot, for the Drift itself. Upon noticing the PCs, they banish the All-
ADVENTURE
and science offer actions using the bonuses, level, and Code’s Child with a wave of their hand (spending 1 Resolve TOOLBOX
ranks listed above. Modifiers for its size, speed, and Point to use their deresolution special ability), causing the
maneuverability are already factored into its statistics. PCs to tumble out from the vanishing starship and fall
Use the following table to determine the effects when onto the Pylon’s summit. All PCs land prone and take 5d6
Valstravoth Mark One takes critical damage. bludgeoning damage from the fall; a PC who succeeds at
DC 22 Reflex save reduces the damage by half and negates
D% System Effect the prone condition as they stick an impressive landing. As
1-30 Weapons Randomly determine one arc the All-Code’s Child is pulled apart into clusters of data, the
array containing weapons; condition applies three access chips reappear in the possession of whichever
to all gunner actions using weapons PC piloted their respective ships.
in that arc. Creature: As leader of the Architects, Sovereign Trinity
31-60 Propulsion Condition applies to all pilot actions. is responsible for the discovery and insertion of the fossil
spellcode into the Drift algorithm and many of the woes in
61-90 Heart Condition applies to all engineer
actions, except when patching or
this adventure. In the following chaos, they directed their
repairing the heart. followers to take over the Nexus on Alluvion to prevent
91-100 Brain During the next round, each of the
anyone from entering the Dataverse and fixing the problems
outsider’s attempted actions has a they have caused. Sovereign Trinity has spent months here at
25% chance of failure. the Pylon’s summit, attempting to refine the fossil spellcode
through the Overterminal in the hopes of completing their
Teleportation (Su) On its turn during the helm phase, in lieu goal of creating a “better” Drift.
of its standard movement, Valstravoth Mark One can Sovereign Trinity has also captured the PCs’ ally
select an empty space within 5 hexes and teleport to Nojisora Kuzori, forced him into his full-animalistic fox
that space with a facing of their choice. Once they use form, and is keeping him prisoner inside of the pet carrier
this ability, they can’t use it again for 1d4 rounds. that sits next to the Overterminal. When the PCs arrive,

35
Sovereign Trinity wastes no time in letting them know paradigm shifts (inhibit, swapping step [DC 23]), upgrade
that Kuzori has been punished for his transgressions. “I slot (mk 1 spell reflector)
control the Dataverse now, and I won’t abide any more Gear elite hardlight series (green force field, pet carrier AA3
interruptions to my work.” Sovereign Trinity isn’t much containing Nojisora Kuzori in Tiny fox form), white
interested in debate. They shake their head at whatever star plasma pistol with 2 ultra-capacity batteries (100
the PCs have to say to them, calling them “misguided charges each)
fools” before initiating combat. SPECIAL ABILITIES
Deresolution (Su) As a standard action, Sovereign Trinity
SOVEREIGN TRINITY CR 15 can spend 1 Resolve Point to strip bare the code
XP 51,200 comprising any creature or object within the Dataverse
Agender android witchwarper (Starfinder Character that they have line of sight, utterly disassembling
Operations Manual 60) it. The target takes 15d10 damage and suffers
N Medium humanoid (android) a wound, as though Sovereign Trinity had
Init +5; Senses darkvision 60 ft., low-light vision; critically hit the target with a weapon
Perception +26 with the wound critical effect. The target
DEFENSE HP 235 RP 6 can attempt a DC 23 Fortitude save to
EAC 28; KAC 29 reduce this damage by half and negate the
Fort +13; Ref +15; Will +16; +2 vs. disease, mind- wound effect. This effect does full damage
affecting effects, poison, and sleep to mechs, starships, and other objects,
Defensive Abilities firewall bypassing hardness. Program creatures and
OFFENSE fully digital objects automatically fail their
Speed 30 ft. saving throw and take 10 times the
Ranged white star plasma damage. This damage multiplier does
pistol +24 (3d8+15 E & F; not apply to any PCs or NPCs who
critical burn 2d8) are avatars within the Dataverse.
Offensive Abilities deresolution Firewall (Su) Creatures that
(DC 23) Sovereign Trinity summons are
Witchwarper Spells Known (CL 15th) effects as if they had cast shield other
5th (3/day)—crush skull (DC 25), render (page with Sovereign Trinity as the target. If
50, DC 25) Sovereign Trinity takes damage when they
4th (6/day)—baleful polymorph AA2 (DC 24), have multiple creatures summoned at
cosmic eddy (DC 24), dimension door, sovereigN triNity a time, one creature takes half that
summon creature AA damage, while another takes the other
3rd (at will)—explosive blast (DC 23), flight half, leaving Sovereign Trinity unharmed. If Sovereign
TACTICS Trinity has three or more summoned creatures active,
Before Combat Sovereign Trinity activated their force field as determine randomly which two take the damage.
the PCs approached the summit.
During Combat Sovereign Trinity begins by casting render EVENT 11: I’M NOT FINISHED YET! (CR 16)
to summon three fire elementals, mimicking a 4th-level Once Sovereign Trinity’s avatar is defeated, their body
summon creatureAA spell. They then alternate between begins to pixelate, tiny cubes dissipating into nothingness.
using spells and their paradigm shifts to harm and hinder When their armor disappears, so does the pet carrier armor
the PCs. Sovereign Trinity has gathered enough data about upgrade, which releases Kuzori. He immediately changes
the PCs to target their weakest saving throws. When back to his true form and rushes over to thank the PCs for
Sovereign Trinity is reduced to 130 Hit Points or fewer, they rescuing him. However, they aren’t completely in the clear.
begin using deresolution against the PCs with abandon. Creature: The PCs have 1 round between the end of the
Morale Sovereign Trinity knows that they’ll reform if the PCs previous combat and the appearance of Sovereign Trinity’s
defeat them here, so they fight to the death. final form to prepare themselves for the combat to come.
STATISTICS During this time, data swirls in the air, hinting things aren’t
Str +0; Dex +5; Con +0; Int +7; Wis +0; Cha +9 over yet.
Skills Computers +31, Engineering +26, Mysticism +31 The data from the android’s avatar begins to coalesce
Languages Common, Brethedan, Castrovelian, Shirren, above the summit into a cloud that also draws in other
Triaxian, Vercite, Vesk, Ysoki data from nearby, including that of the destroyed All-
Other Abilities alternate outcome (2/day), constructed, Code’s Child. At the end of the round, the amorphous cloud
flat affect, infinite worlds (3/day, 250 ft., 15 rounds), resolves into a huge technological dragon, from which

36
Sovereign Trinity’s voice booms for all the Dataverse Other Abilities cache capacitor 1 (keen senses), change
to hear. shape (specific human guise), magic hacks (diviner’s tap,
extended spell), spell cache (personal comm unit)
“Small-minded saboteurs! Did you honestly think I would Gear white carbon carbon skin (white force field);
allow you to undo what my Architects have toiled to achieve? Augmentations mk 2 force soles INTO THE
The Drift Crash was but a minor setback. My Architects DATAVERSE
SPECIAL ABILITIES
have toiled constantly to repair—no, improve!—the greatest Foxfire (Su) As a ranged attack, Kuzori can conjure forth
creation of my predecessor. Innovation is the nature of a ball of electricity and fire to hurl at a foe. This attack
mortal expression. It is our solemn duty and sovereign right has a range increment of 30 feet and has the burn 1d8
to improve upon that which we have been given. And if you critical hit effect. CHAPTER 1:
cannot see that, if you refuse to see that, then you will perish.” LOGGING IN
DRACONIC TRINITY CR 16
This draconic version of Sovereign Trinity begins the fight XP 76,800
100 feet above the summit. Meanwhile, Kuzori moves behind Assault disintegrator dragon (page 60)
CHAPTER 2:
the PCs, and though he doesn’t consider himself much of a HP 300 ACCESS
fighter, he now has little choice in the matter. He tries to stay TACTICS
GRANTED
as far from Trinity as possible, but can offer the PCs some aid During Combat Trinity begins by swooping down to engulf
in the form of magic. the PCs with their breath weapon. They then blast at CHAPTER 3:
whoever is left standing with their disintegrator cannon. HARD
NOJISORA KUZORI CR 10 If any PC gets close enough, they strike with their
RESET
XP 9,600 natural attacks.
Male kitsune technomancer Morale Maddened by their first defeat, this draconic
N Medium humanoid (kitsune, shapechanger) version of Sovereign Trinity fights until reduced to 0
Init +5; Senses low-light vision; Perception +19 Hit Points.
DEFENSE HP 140 RP 5 CONTINUING
EAC 22; KAC 23 RESTORING THE DRIFT THE
Fort +9; Ref +9; Will +13 When Sovereign Trinity’s disintegrator dragon form is CAMPAIGN
OFFENSE reduced to 0 Hit Points, it releases an explosion of light and
Speed 30 ft. data. The information from The All-Code’s Child scatters,
Melee claw +16 (2d8+10 S) leaving Sovereign Trinity’s original avatar kneeling on the
ADVENTURE
Ranged foxfire +18 (3d4+10 E & F; critical burn 1d8) ground in a battered state, on the verge of unconsciousness. TOOLBOX
Kitsune Spell-Like Abilities (CL 10th) The android’s life is in the PCs’ hands, and if they decide to
3/day—dancing lights spare them, Trinity collapses a moment later.
Technomancer Spells Known (CL 10th; ranged +18) The PCs can now approach the Overterminal and attempt
4th (3/day)—greater invisibility, resistant armor to access the All-Code’s Algorithm. This tier 10 computer
3rd (6/day)—arcing surge (DC 21), displacement, haste, features three ports, each about the size of a credstick.
mass helping hands GM Naturally, the PCs can gain access by inserting the three
2nd (at will)—caustic conversion, microbot assault access chips they needed to enter PlyPort Hangar and pilot
TACTICS the three starships; thankfully, as no mortal would have a
During Combat Kuzori knows he’s absolutely outclassed chance of hacking it. If needed, a PC who succeeds at a DC
against Sovereign Trinity, so he begins combat by cloaking 15 Computers check realizes this.
himself in invisibility and moving out of any direct lines Once the PCs have gained access, a colossal holographic
of attack. He provides the PCs with buffs like haste and image of Triune’s multi-limbed mechanical form appears in
displacement using his extended spell magic hack, and the skies above . This time, however, it’s no mere recording.
then casts microbot assault to harry Trinity. If that doesn’t This is a projection of the deity’s consciousness from its
seem to be helping, he switches to more damaging spells. secure vault deep within the Dataverse, through which
Morale Kuzori stands with the PCs until the end, convinced Triune can speak now that the PCs have put an end to the
that Sovereign Trinity needs to be stopped at all costs. Architects’ direct meddling. It greets the PCs formally and
STATISTICS explains to them how Sovereign Trinity and the Architects
Str +0; Dex +5; Con +1; Int +8; Wis +1; Cha +3 caused the Drift Crisis.
Skills Athletics +24, Acrobatics +24, Computers +24,
Engineering +19, Mysticism +24 “The unauthorized upload thrust upon the divine code
Languages Akitonian, Castrovelian, Common, Elven, contained archaic prototype schematics for the Drift,
Kasatha, Shirren, Sylvan, Vesk, Ysoki as well as confidential information which would, if

37
assimilated, have resulted in a violation of the Gap AN ULTIMATE SACRIFICE
protocol, triggering a Class 47 reality rollback. To prevent To restore the Drift and admit Triune back into main
this, User Triune was relegated to the Dataverse’s secure areas of the Dataverse, the PCs must choose someone to
backup servers to prevent loss of deific data, but key become the new Operator. A PC who succeeds at a DC 15
files were deleted from the Drift algorithm that otherwise Life Science or Mysticism check understands that Triune’s
ensured safe and smooth operation. explanation of the process means the chosen individual’s
“Only a designated Dataverse Operator can allow User mind will be permanently “erased” from their mortal body.
Triune to resurface from the Dataverse’s backup servers. Said body will otherwise remain alive and retain its soul,
There is no current Operator to perform this necessary but none of their memories will remain. For a constructed
function. Unfortunately, Operator Valstravoth became creature such as an android or an SRO, this essentially
corrupted during the Drift Crash, and so a new operator returns the individual to the initial state that all androids
must be designated. Relegated to the backup servers, User find themselves in when they come online for the first
Triune is unable to create a new spectra to serve this role. time—in possession of all their built-in programming and
As Dataverse programs lack the complexity for independent facilities, but no memory whatsoever. For living and undead
thought, so a new Operator must be chosen from among the creatures, however, this results in a body completely
mortals assembled here atop the Pylon of the Triumvirate. devoid of all learned behaviors and capabilities, much akin
“Warning: ascension to Dataverse Operator is irreversible to someone with total amnesia.
and will result in complete transfer of the mortal’s mind Triune’s Operator will become a being of pure data,
into the Dataverse, resetting their material body to factory unique outsider with the spectra subtype (in addition to
default settings.” their original subtypes) who acts as Triune’s newest herald.
Triune is able to explain this, wishing for the PCs to make
In its sequestered state, Triune can’t answer any an informed choice.
questions about ascension process or the true nature of The decision of who will become the Dataverse’s next
the fossil spellcode. Such queries are returned with error Operator is a big one, and it’s possible that no PC may wish
messages, simple repetition of the facts as already given, to make this sacrifice. There are two additional options for
or, if the PCs seem particularly distressed, apologies that the PCs to consider when deciding who should become
the burden of choice has fallen on their shoulders. Operator—Nojisora Kuzori and Sovereign Trinity. If either

38
NPC is alive and conscious, each willingly offers themself
up for the task. Kuzori informs the PCs that although

CONCLUDING THE
he still has family in Absalom Station and only recently
joined the Architects, he feels guilty that he was unable
to see through their schemes. He also admits to wanting
to discover new ways that the Drift can be used to help
ADVENTURE INTO THE
DATAVERSE
people throughout the galaxy, and that he trusts the PCs
fully to take care of his body for him after seeing the
lengths they went to in restoring the Drift. Sovereign As the PCs awaken from their uplink in the Nexus
Trinity, on the other hand, feels a degree of remorse for subbasement, visions of Triune appear simultaneously CHAPTER 1:
the single-mindedness they exhibited in pursuing the in front of each of the Drift obelisks throughout Alluvion LOGGING IN
Architects’ experiments, specifically in how their actions to announce the deity’s return. The sight is a spectacle, as
unintentionally kept Triune imprisoned from reality. Triune rarely makes such obvious appearances, even before
After the PCs have chosen the new Operator, Triune its faithful. Resounding cries erupt through Alluvion as the
CHAPTER 2:
prompts that individual to place a hand upon the city immediately stops deteriorating, and, in some places, ACCESS
Overterminal, allowing the data that comprises their begin to reform. Swirling ribbons of light burst from the top GRANTED
avatar to intermingle with that of Triune. In a flash, that of the Nexus and into the Drift, fading into invisibility after a
avatar’s data is drawn out and into the terminal, where few minutes. Within a matter of weeks, this phenomenon will CHAPTER 3:
it joins the Dataverse’s code forever more. Moments be regarding as the heralding of the existence of the newly HARD
later, that individual rematerializes within the Dataverse created Drift lanes (Starfinder Drift Crisis 144)—supercharged
in a resplendent new form befitting an Operator. If a PC Drift pathways that connect two points on the Material Plane.
RESET
becomes Operator, allow them to describe themselves These lanes will change the setting of Starfinder forever.
however they see fit, and encourage them to note any The various Triunite sects, led by the likes of Emerald-9
symbols of Triune that appear on their new form. If Kuzori and the PCs’ other allies in Alluvion, get to work retaking
becomes Operator, he manifests much as he did before—a the Nexus and apprehending as many Architects there as CONTINUING
kitsune with fur that constantly scintillates with the colors possible. Those Architects whose avatars were “killed” in the THE
of the rainbow, nine tails, and a single, golden ring on the Dataverse are given appropriate funeral rites as the Church CAMPAIGN
top of each of his palms and on his brow representing the of Triune begins to pick up the pieces of its shattered clergy.
holy symbol of Triune. He wears a simple technological A few days after the PCs log out, new vessels begin
armor covering his torso and joints in this form, but little appearing near Alluvion to confirm that the Drift is working
ADVENTURE
else. If Sovereign Trinity becomes Operator, they reinvent once more. With the Drift Crisis over, the citizens of Alluvion TOOLBOX
themselves as Operator Trinity, manifesting as a spectra regain their optimism that the future will be bright. A week-
with a nine-limbed robotic body not unlike Triune’s. On long festival is held throughout the city to celebrate the
their frame is a massive three-ringed holy symbol of triune PCs’ triumph and to honor whomever sacrificed themself to
with holographic screens within each of the rings that become the Dataverse Operator. This might be a bittersweet
depicts Sovereign Trinity’s former face, allowing them to moment for the PCs, even if one of them gave up their mortal
communicate. life to save the entire galaxy, but be sure to give them the
The sensation of becoming the Dataverse’s Operator is opportunity to express their emotions. In the end, the PCs
overwhelming at first as the individual’s mind syncs with are offered stations of the highest honor possible within the
the Dataverse, allowing them to simultaneously recall and Church of Triune (or other renumerations as you see fit).
understand all data indexed within the demiplane as easily At the end of the festival, the PCs can return to their
if they were recalling a memory of an event that happened starship (which has been generously refitted with the latest
moments prior. Almost immediately, the new Operator systems for free by grateful Triunite engineers) and, if they
intuits how to readmit Triune to the Dataverse—and by wish, take to the stars once more. With the emergence
extension, reality—by adjusting and replacing numerous of Drift lanes, there are whole new avenues of exploration
corrupted files. After scarcely a minute, the Overterminal waiting out there for them!
begins to emit brilliant radiance as Triune manifests before New locales begin popping up all around the galaxy, as the
the remaining PCs in full, deific splendor, holding the sudden appearance of Drift lanes re-invigorates economies
dataverse in one of its hands. Triune thanks the PCs for and flares up existing tensions between major powers. Many
their service and returns them to their material bodies, of these locations appear in the upcoming Starfinder Ports
terminating their connection to the Dataverse. of Call, which sets the stage for the Starfinder setting post-
If one of the PCs accepted the role as Operator, then their Drift Crisis. With the emergence of Drift lanes, there are
body is now devoid of its memories. The PC is effectively whole new avenues of exploration and adventure waiting
reborn though without any knowledge of their past. out there for the PCs!

39
40
CONTINUING THE CAMPAIGN

INTO THE
The Drift Hackers Adventure Path ends when the PCs defeat Empire annexes a system these lanes pass through, also DATAVERSE
Sovereign Trinity’s avatar and repair the underlying code of thanks to a newly discovered Drift lane. The Azlanti sardat
the Drift. However, the heroes’ adventures don’t need to end in control of this connecting system demands excessive
there. Though they have essentially ended the Drift Crisis, the tariffs from Cestairan vessels passing through, on threat of
catastrophe’s effects are still being dealt with throughout the violence from the might of the Azlanti military. These taxes CHAPTER 1:
galaxy. Such problems are ripe to be addressed by a group of soon become too burdensome for the Cestairan government LOGGING IN
powerful heroes. to bear, and without the medicine, fear begins to grip the
A Bronze Age: Even after the Drift Crisis ends, Alluvion population of Cestair. Can the PCs find a diplomatic way to
remains a fractured city struggling to reflect the wholeness end this crisis, or will they have to resort to a violent incursion
CHAPTER 2:
of Triune. In the wake of the Architects’ power grab, the three into Azlanti space? ACCESS
factions of Casandalee, Brigh, and Epoch faithful must mend Top of the Charts: The appearance of Drift lanes is a GRANTED
the broken trusts between them. A sect of Brigh followers marvel to many in the Pact Worlds and necessitate daring
calling itself the Roaring Whisper begin pushing for a return to explorers willing to step into the unknown to help chart the CHAPTER 3:
a simpler time. They seek to eschew most modern technology, new spaceways. Working from offices in Absalom Station, HARD
citing it as the means by which the Architects were able to a company called Galactic Byways soon emerges as a new
cause so much turmoil. The Roaring Whisper’s leader, Xalwrie centralized intergalactic survey organization focused on
RESET
Dimhollow (CN female gnome solarian), is the most extreme charting the galaxy. Their goal is the creation of a unified
among them, advocating for the destruction of the city’s star chart of all Drift lanes. As part of this momentous
computers and other high-tech equipment for the good of undertaking, a crew is sent to explore a Drift lane that begins
the galaxy. Maia Whisperworks asks the PCs to engage with near Aucturn in the Pact Worlds system, but whose other CONTINUING
the faction diplomatically as Dimhollow’s followers engage in terminus is unknown. That crew vanishes without a trace THE
more and more radical acts of sabotage throughout the city. upon entering the Drift lane. With rumors circulating as to CAMPAIGN
God in the Machines: A few weeks after the end of the their fate and some in Galactic Byways believing the crew
Drift Crisis, the followers of Triune begin to hear the voice were attacked by Dominion of the Black forces, the PCs are
of their deity once more, however something isn’t quite right. employed to investigate the fate of the missing crew, and
ADVENTURE
Emerald-9 requests the PCs return to Alluvion. He struggles perhaps complete their original mission. TOOLBOX
to explain why he and so many others are worried that Triune What if the PCs Lose?: Upon losing the battle against
has somehow changed. He asks the PCs to undertake a Sovereign Trinity within the Dataverse, the PCs’ avatars are
ritual that will open their own minds to the All-Code, which deleted and their physical minds are destroyed. The Architects
allows them to sense that the tripartite god has a splinter of are able to continue unchallenged, and their attempts to fix
a fourth nascent godhood growing within it. This fourth facet the Drift Crisis by altering the fossil code and recompiling it
is somehow connected to the mysterious intelligence that lead to disastrous results. The Drift begins to “expand” into
created the sentient machines of Aballon. Traveling there, the Material Plane, pushing into populated regions like the
the PCs find the planet in chaos, as a full war has broken Pact Worlds and the Veskarium. Gigantic fragments of Drift
out between Those Who Wait and Those Who Become. Both space swallow whole planets, spurring massive evacuation
sides sense what they believe is the imminent return of their efforts as those worlds quickly become uninhabitable. This
creators the First Ones, though they disagree as to the reason. catastrophe is made worse by the fact that Drift travel is
Is the fragment growing within Triune a First One god? What almost wholly inaccessible, and those who attempt it are
will happen if it gains full power? In the meantime, can the never seen again. Amid the chaos, a new group of heroes must
PCs help bring a temporary peace to Aballon? rise to help the helpless and try to form a makeshift coalition
The Iron Hand of Tyranny: The creation of Drift lanes between squabbling, disparate factions for the good of the
is primed to force many galactic settlements to quickly galaxy. In the end, these heroes might be able to reverse the
restructure their import and export practices. Some worlds calamity, but it will take unprecedented planar power or even
find their new “neighbors” not as interested in peaceful trade the intervention of a deity.
as might be hoped. This problem is especially evident on the
Vast world of Cestair, who were at first thrilled to learn that a DEVOURED
new Drift lane now connects them to the terraformed planet Emerging from the Dataverse, the PCs have little time to
from which they’ve been harvesting life-saving medication. rest on their laurels as Alluvion makes one more Drift jump.
Unfortunately, their joy turns sour when the Azlanti Star This time, unfortunately, it appears near the Flotilla of the

41
Devourer (Starfinder Adventure Path #4: The Ruined Clouds while, the leaders of the three factions of the Church of Triune
49). This massive makeshift fortress inhabited by members of are putting together a plan to mount a counteroffensive.
the twisted Cult of the Devourer has been mostly unaffected During this time, though, the cultists of the Flotilla of the
by the Drift Crisis, and the cultists are eager to seize the Devourer are hatching their own schemes. The cult has no
opportunity presented by the arrival of the fractured city. shortage of opportunistic members, many of whom are eager
Numerous terrifying vessels launch from the flotilla to all but to be the one who lands the “killing blow” on the city. However,
surround Alluvion. relatively few genuinely comprehend the value Alluvion
The cult has only an inkling of what potential prizes Alluvion possesses. Codebreaker (CE male ysoki technomancer) is the
holds, yet many of its members are eager to bring entropy’s fleet’s premiere technological expert, having gained fame as
touch to it. Devourer starships begin orbital bombardment, a digital terrorist throughout the Diaspora and leading his
dropping payloads that carry a virulent disease. The PCs are cell of murderous hackers to the Flotilla by hunting down
called upon once again to help Alluvion’s citizens while they its unique electronic signature. Codebreaker recognizes that
dodge raining shrapnel. Medically trained PCs are enlisted the taking of Alluvion, even its damaged state, offers the
to help find, synthesize, and distribute a cure for the cult’s opportunity to destroy the Drift, throwing the entire galaxy
disease. Others can work to free civilians trapped in the into chaos. He leads his most loyal underlings—a sect who
rubble or help quell the rising panic in the streets. All the call themselves the Fragmented—down to the city streets in
a vessel disguised as a hunk of wreckage to find the source
of the Drift.
On the other side of the coin is the vicious Nahrma
Bleaksinger (CE female human biohacker), the one responsible
for the creation of the disease ravaged the city. She sees
Alluvion as merely a target to be thoroughly annihilated,
spreading as much despair and misery as possible in the
process. From her battleship, Entropy’s Tooth, she continues
to rain death upon the streets. The leaders of Alluvion
recognize that Entropy’s Tooth is the largest threat facing
the city and send the PCs to first take out as many of the
battleship’s fighter escorts as they can before infiltrating the
vessel and dealing with its captain. Entropy’s Tooth is a maze
of damaged corridors and crude repairs, and no matter how
the PCs go about exploring, they will encounter unhinged
cultists and other dangers. Even if they defeat Bleaksinger
and put an end to the bombardment, the PCs have a surprise
waiting for them when they return.
Though Codebreaker has yet to find a way to enter and
corrupt the Dataverse, the ysoki cultist and his Defragmented
have managed to take over the city’s array of Drift obelisks
that control Alluvion’s jumps through the Drift. He is holding
the entire city hostage, sending a message through every
electronic device that he will cause the city to fall into the
gravity well that it floats above if his demands aren’t met:
an escort into the Nexus, Alluvion’s temple to Triune.
Codebreaker rightly surmises that from there he will be able
to corrupt the Drift to become a corrosive null space that no
one can ever enter again. While the clock ticks away, the PCs
are tasked with discovering where Codebreaker is hiding and
stop the ysoki’s wicked plan.
With some investigation, the PCs track down Codebreaker
to a neighborhood locally known as Circuitedge that had
suffered much damage during the Drift Crisis. The Fragmented
patrol amid crumbling homes and stores, turning nearby
electronic devices into dangerous hazards through hacking and
mechanical deviousness. With the first forays into Circuitedge,
Fragmented Cultist the PCs will learn that their non-analog weapons can be turned

42
into liabilities, so they might wish to retreat to arm themselves
with simpler tools, some of which might include pieces of TWISTS AND TURNS
clockwork gear detailed in Starfinder Adventure Path #50: Before you undertake the “Hack to the Future"
Clockwork Demons. (If you’re feeling especially adventurous, campaign seed, double-check with your players to
you may even want to design clockwork powered armor or make sure they’re comfortable with having their INTO THE
mechs the PCs to take into battle!) PCs be involved in unusual circumstances that
DATAVERSE
Eventually, the PCs can reach Codebreaker’s base might affect their backstories. Not everyone enjoys
of operations: a derelict HAC arcade that the ysoki has stories where they discover the reality they took for
completely rewired to his whims. The heroes must push granted is a lie, or find out their “real” character and
through his legion of fragmented cultists within hacked their loved ones are long-since deceased. However, CHAPTER 1:
holographic chambers that display visions of collapsed if your players enjoyed stories like The Threefold LOGGING IN
civilizations and the heat death of the universe. If the PCs can Conspiracy Adventure Path, they might get a kick
tell these illusions apart from what is real, they can eventually
confront Codebreaker and save the Drift once more!
out of portraying these digital copies. As a GM,
CHAPTER 2:
work with your players to create a game that’s
fun for everybody at the table; communicate with
ACCESS
FRAGMENTED CULTIST CR 9 players to gauge if they’re interested in taking part GRANTED
XP 6,400 in this story, and avoid springing the full details
CE Medium humanoid (human) of the campaign on them without their consent or CHAPTER 3:
Init +6; Senses low-light vision; Perception +15 involvement. HARD
DEFENSE
EAC 22; KAC 24
HP 145 RESET
Fort +13; Ref +11; Will +8 from their defrag rig that has the potential to disrupt the
Defensive Abilities ferocity electronics of all powered weapons in a 15-foot-radius
OFFENSE burst. The cultist attempts a single Computers check to
Speed 30 ft. affect each non-analog weapon in the burst, comparing CONTINUING
Melee hook knife +18 (1d8+12 P) the result to a DC equal to 15 + 1-1/2 × the weapon’s THE
Ranged liquidator disintegrator rifle +21 (1d20+9 A; critical item level for each weapon. On a success, the weapon CAMPAIGN
corrode 2d6) is unusable for 1d4 rounds. Whether successful or not,
Offensive Abilities caustic splash (DC 16), weapon defrag once a Fragmented cultist attempts this skill check,
those same weapons can’t be affected by any cultist’s
ADVENTURE
STATISTICS
Str +3; Dex +6; Con +4; Int +0; Wis +1; Cha –1 frag weapon ability for 24 hours. TOOLBOX
Skills Athletics +17, Computers +22, Intimidate +17
Languages Common DRIFTING THE LANES
Gear advanced iridishell, hook knife AR, liquidator With the advent of Drift lanes across the galaxy, the PCs can
disintegrator rifleAR with 2 high-capacity batteries be at the forefront of a new wave of exploration. These lanes
(40 charges each), defrag rig; Augmentations retinal allow quick access between different regions of space and the
reflectors PCs can be some of the first to stake a claim. A handful of
SPECIAL ABILITIES notable Drift lanes receive expansion in Starfinder Ports of
Caustic Splash (Ex) When a Fragmented cultist hits with an Call, but there are countless uncharted lanes that could put
attack with a weapon from the disintegrator category, the PCs in contact with all manner of galactic threats!
one creature adjacent to the original target takes an Countless antagonist forces make their moves on these
amount of acid damage equal to half the damage taken Drift lanes. The Azlanti Star Empire begin seizing lanes that
by the original target (though it isn’t affected by any put them in direct confrontation with the Veskarium, setting
critical hit effects). The affected creature can attempt these two great interstellar empires at odds. However, other
a DC 16 Reflex saving throw to halve the damage yet forces take advantage of lesser-known Drift lanes, including
again. In addition, when a Defragmented scores a critical members of the Jinsul Hierocracy (Starfinder Adventure
hit with a weapon from the disintegrator category, the Path: Scoured Stars) have also taken to using these new
damage of its corrode critical hit effect is increased by lanes as a means of expediting their nefarious plans. Shortly
1d6 (already factored into the stats above). If the weapon after the advent of Drift lanes, the jinsuls further establish
doesn’t have the corrode critical hit effect, the weapon themselves across the Vast after discovering a honeycomb
gains corrode 1d6 as a critical hit effect, which functions of Drift lanes that encompass several regions of previously
even if the weapon already has another critical hit effect. unexplored space.
Frag Weapon (Ex) As a standard action, a Fragmented At their new levels of power, the PCs might find themselves
cultist can send out a burst of harmful computer code involved in existing struggles. With the Drift Crisis officially

43
ended, countless civilizations still reel from the galaxy-wide and the backups have been in storage until such a time as
event. The ongoing cold war between the Gideron Authority they were needed. That time has come.
and the Marixah Republic (both detailed in Starfinder Near However, the PCs don’t discover all this information
Space) is set to finally go hot, with the Authority continuing immediately. They spend a few hours investigating the faux
to mass weapons secretly provided by drow backers from the Alluvion, wondering if they have been trapped by some
Pact World of Apostae and the Republic rallying around the terrible magic or trick of technology. The more they look
rising star of Admiral Prengst (LN agender half-orc). While the around, the more the algorithm begins to deteriorate—NPCs
Marixah Republic deals with the ongoing constitutional crisis stutter and repeat lines of dialogue before vanishing in bursts
caused by Admiral Prengst’s popularity, a relatively unknown of code; buildings lose all their textures; and the usually
captain in the Gideron Authority has already begun planning vibrant sky of Drift space above the city becomes static-y and
what could be a galaxy-defining battle plan that threatens to fragmented. Soon enough, bizarre manifestations of corrupted
plunge countless civilizations into conflict. The PCs might be code burst forth from the ground and attack. The PCs must
the only ones capable of stepping in and stopping the war fight their way to safety and dodge environmental hazards
between these two galactic powers. that threaten to topple blocky architecture down upon their
Finally, threats closer to home take advantage of the heads. Eventually, they spot an unusual beacon of light above
aftermath of the Drift Crisis, with the Corpse Fleet deploying the skyline that leads to an untouched computer café in a
assets into the Pact Worlds for the first time since their posh Alluvion neighborhood. Within is a single green door,
departure by using unknown Drift lanes. These fleets exit behind which is a strangely featureless chamber. Stepping
the Drift within the general region of the Diaspora and began through, they exit the algorithm and meet a software imp
wreaking havoc on different installations and mining interests, named 3Byte, who explains the Dataverse’s predicament and
claiming countless hostages and corpses for conversion into the PCs’ role in saving it.
undead before fleeing back to their strongholds in the Vast. 3Byte explains that minor glitches caused by the
Led by Captain Xorketh (CE android vampire soldier), these Architects’ meddling with the Dataverse have been quietly
fleets seek to reinvigorate the legions of Corpse Fleet agents, compounding over the decades since the original PCs defeated
converting many into intelligent undead with the aim of Sovereign Trinity. Some of these errors were dealt with by
gathering the latest information on Pact Worlds security. The Triune’s normal security protocols, but a silver of corrupted
Pact Worlds see the heroes of the Drift Crisis as the obvious code remained unfound in an unused data sector for some
candidates to lead a rescue mission, avoiding pulling the Pact time until it evolved a level of sentience rivaling artificial
Worlds directly into the conflict and risking a more overt intelligence. This new creature, calling itself Gate-505, has
conflict with the Corpse Fleet. recently begun to enact a plan to remake the Dataverse in its
own image, foul and corrupted. Other programs have fallen
HACK TO THE FUTURE under its sway—becoming the minions the PCs encountered
Following their victory over Sovereign Trinity, the PCs in the Alluvion algorithm—and 3Byte believes that Gate-505
can emerge from the Dataverse at their leisure… but the wants to do the same to the PCs. The imp notes that Triune
connection isn’t so easily severed. has activated the PCs to save them from this fate, but also to
At first, the heroes believe they have re-entered the help defeat Gate-505.
physical realm and can make their way out of the Nexus After explaining the threat of Gate-505, 3Byte assures the
sub-basement from which they logged onto the Dataverse PCs there is hope. If they can recover samples of Gate-505’s
and step out into Alluvion proper once more. However, the original source code, the software imp can recompile them into
PCs immediately begin to realize that something is amiss. a functional program that can overwrite the corrupted one and
The city seems to be in one piece again, and no signs of the reverse its effects on the Dataverse. But to do so, the PCs
Drift Crisis are apparent. In fact, none of Alluvion’s residents must journey all across the Dataverse to places that have been
recognize the PCs or have heard of their recent escapades to wholly or partially corrupted by Gate-505 and sift through
save the Drift. Friends and allies such as Emerald-9 and Maia the debris for the necessary information. To aid in their quest,
Whisperworks are nowhere to be found. Did repairing the 3Byte transforms itself in a digital starship and serves as the
Drift code somehow send the PCs to an alternate universe or vessel’s incorrigibly cheerful AI. In addition, the PCs are not
somehow change the timestream? without allies in this new future. Later versions of programs
In actuality, the PCs are still in the Dataverse. They are in the original PCs interacted with in “Into the Dataverse” are
a “holding algorithm” that resembles Alluvion to help them happy to lend their aid, excited to meet the heroes that their
adjust to the full truth: the PCs aren’t exactly the heroes who progenitors have told stories about. These programs can offer
ended the Drift Crisis. They’re backups of those individuals’ the PCs places to rest and resupply during their mission.
avatars made at the point the original PCs exited the For all the areas the PCs must visit, use the final adventure
Dataverse and went on to lead the rest of their lives. Three as inspiration, but the landscape of this virtual realm can also
hundred years have passed in the real world since that time, have changed much over the centuries. The PCs might find

44
themselves once again needing to explore various unusual Ranged fragmentation ray +25 (4d6+15 E; critical stunned)
realms. The PCs might return to the mountaintop where their Space 20 ft.; Reach 20 ft.
original selves fought Sovereign Trinity centuries before or Offensive Abilities swallow whole (5d8+20 A, EAC 28,
trek through the Rezwastes to find a new, bustling metropolis KAC 25, 58 Hit Points)
that is home to a legion of Gate-505’s minions. All the while, Spell-like Abilities (CL 15th; melee +23) INTO THE
Gate-505 sends out fleets of countermeasure and armies of 1/day—holographic terrain (DC 25), render (DC 25, DATAVERSE
malware to seek out the PCs and return them to its lair for page 50)
re-programming. 3/day—mind thrust (4th level, DC 24), reformat (DC 25,
The PCs eventually learn that the truest kernel of source page 50), rewire flesh (DC 24), suppressing field GM
code they can access exists in that very lair. They may (DC 24) CHAPTER 1:
contrive to get themselves captured or blaze a trail of glory At will—entropic grasp (DC 23), irradiate (DC 23) LOGGING IN
to find the digital cavern where Gate-505 lurks and schemes. STATISTICS
The corrupt program appears as gargantuan serpentine Str +5; Dex +7; Con +4; Int +9; Wis +2; Cha +1
dataworm with slavering jaws and writhing tentacles that Skills Athletics +26, Computers +31, Physical Science +31
CHAPTER 2:
sing with distorted audio. Gate-505 spends most of its time Languages Akitonian, Brethedan, Castrovelian, Common, ACCESS
curled around a shard of crystallized light that represents Eoxian, Kasatha, Shirren, Vercite, Vesk, Ysoki; GRANTED
the unaddressed anomalies from which it was spawned. The truespeech
dataworm jealously guards this crystal, knowing the code Other Abilities computerized mind, data construct CHAPTER 3:
within could be used as its undoing. If the PCs confront Gate- SPECIAL ABILITIES HARD
505 directly, it abandons its thoughts of corrupting the PCs Fragmentation Ray (Su) As a ranged attack, Gate-505 can
and turns its mind to destroying them. fire a ray of electricity from its eyes that scramble’s a
RESET
Even if the PCs defeat Gate-505, their success is temporary. target’s digital signature. This ray has a range increment
Over comms, 3Byte reminds them they must retrieve the of 80 feet and stuns a target on a critical hit.
source code to stop the dataworm from regenerating.
Recompiling this code could be represented CONTINUING
by a difficult dynamic hacking encounter THE
(Starfinder Tech Revolution 70) occurring on CAMPAIGN
board 3Byte during a starship battle of epic
proportions against Gate-505’s remaining
forces. Once the dataworm’s corruption has
ADVENTURE
been reverses, the Dataverse is saved once TOOLBOX
again, but the PCs might not be satisfied
with remaining in this virtual realm.
Though they are little more than backup
programs created by Triune, the god
might see fit to reward them with a way
to take on physical bodies in the real world!

GATE-505 CR 15
Unique program creature (page 58)
CE Gargantuan magical beast (technological)
Init +7; Senses darkvision 60 ft., low-light vision;
Perception +31
Aura frightful presence (150 ft., Will DC 23)
DEFENSE HP 235
EAC 28; KAC 29
Fort +15; Ref +15; Will +18; +4 vs. mind-affecting effects
Immunities paralysis, sleep
Weaknesses virtual dependency
OFFENSE
Speed 40 ft., burrow 30 ft.
Melee pattern-overriding bite +23 (5d8+20 S plus
swallow whole) or
binaural tentacle +23 (6d4+20 So) gate-505

45
46
ADVENTURE TOOLBOX

INTO THE
ROOT ACCESS down their identity later, granting a +2 circumstance bonus to DATAVERSE
Most of the tasks listed in the Starfinder Core Rulebook for the a Computers or Culture check to recall knowledge about that
Computers skill represent its use in combat, while hacking into person or to a Diplomacy check to gather information about
a system, or while operating a science station on a starship, that person.
but skilled hackers recognize several other possibilities. The CHAPTER 1:
following optional tasks expand on the Computers skill, and EXPAND PROCESSING POWER LOGGING IN
several can be used alongside the dynamic hacking rules Sometimes it’s necessary to chain multiple computers and
(Starfinder Tech Revolution 70). systems together to allow them to share a data load and
expand processing power between them, especially when
CHAPTER 2:
CHANGE OR MANAGE ACCESS involved in hacking a secure server, data mining, or creating ACCESS
It’s often more difficult to change the security protocols of a higher-end programs. This task allows you to temporarily GRANTED
system than to break into a system in the first place. If you combine two smaller computers or a similar cluster of servers
have access to a system, you can grant basic access to new together for greater processing power. This takes 1 hour of CHAPTER 3:
users, modify security access for existing users, or even lock work and allows you treat the higher of the two computers’ HARD
out a user. The DC is equal to the DC to hack the computer tiers as 1 tier higher for the next 8 hours, as long as that new
+ 5. If you succeed at the check, the requested changes are tier doesn’t exceed a number equal to half your ranks in the
RESET
implemented. If you have root access, this task doesn’t require Computers skill. At the end of the 8 hours, the two computers
a skill check. You can’t take 10 or take 20 on a Computers return to normal.
check to change or manage access.
IDENTIFY PROGRAM CONTINUING
CODING You can use Computers to recognize a program coded by THE
If you have enough ranks in Computers, you can create another (see above) that you know is on a system. The DC CAMPAIGN
programs to operate alongside your computer use or dynamic of this check is equal to 10 + 4 × the level of the program.
hacking encounters. Programs are single-use creations that This doesn’t require an action. You can’t take 10 or 20 on a
last for the duration of an encounter or until their task is Computers check to identify a program.
ADVENTURE
completed, whichever is longer. However, to be used while TOOLBOX
accessing a system or infosphere, programs must be created INITIATE SHUTDOWN
ahead of time and stored on a physical device like a memory In general practice, initiating a system shutdown requires the
stick; otherwise, the program’s code is automatically run upon highest level of security access, so for an unwelcome guest
creation. Like crafting equipment, you must have a number in the system, root access is necessary before a shutdown
of ranks in Computers equal or greater than the level of the becomes an option. More complicated systems require more
program to be created (see sample programs on page 48). steps to shut down each module and accessory installed on
Coding requires that you have access to a computer of a a system. This works similar to hacking the same computer,
tier equal to or higher than the level of the program being but the DC is 10 higher and the user must have gained root
created. Coding a program has a base time of 1 hour, but if access to attempt the shutdown. If successful, the system
your computer’s tier exceeds the program’s level, you can moves into a shutdown protocol that takes 5 × the computer’s
code that program in half the time (if your computer’s tier tier rounds to complete. Upon complete shutdown, a system
is more than twice the program’s level, the time is quartered generally will take 10 × the computer’s tier rounds to restart,
instead). Coding a program doesn’t require UPBs, only the but this doesn’t require a skill check. You can’t take 10 or take
time, computer, and physical media to house the computer. 20 on a Computers check to initiate a shutdown.
You can’t have more than one copy of a program on any piece
of physical media at the same time. PING DEVICES
With access to a terminal, you can easily find out which
DISCOVER USER OR PROGRAMMER devices in the room you’re in are connected to that system.
When struggling against another user in the same system, you You must spend a standard action and succeed at a DC 10
can tag their persona, granting you a snapshot of their user Computers check. This only lets you know which devices
data. The DC for identifying and tagging another user equals are active and connected to the system but doesn’t give you
15 + 1-1/2 × the target’s CR. This is a minor action if used in access to hijack or control them. If you have root access, this
a dynamic hacking encounter. This data can be used to track task doesn’t require a check.

47
TRACEROUTE BACKDOOR
If you have access to a system, you can send a small packet Backdoor programs leave a way back into a system that
of information throughout the system to inform you of the you’ve managed to gain remote or root access to, granting a
system’s access points, the nodes the digital information +2 circumstance bonus to Computers checks to hack into the
must go through in the system before accessing an outside same system. A backdoor remains open for up to 10 minutes
infosphere, and generally map out the size and scope of a per program level.
system to identify modules and accessories attached. The
DC is equal to the DC to hack the computer, but as a basic DELAYBOT
command, traceroute doesn’t put up any red flags for system Delaybot programs are designed as emergency fail-safes
admins and countermeasures to recognize the hack. If you to delay the inevitable triggering of countermeasures. A
have root access, this task doesn’t require a check. delaybot can be deployed as a reaction to a failed Computers
check to hack what would trigger a countermeasure (or, in
SAMPLE PROGRAMS the case of a dynamic hacking encounter, a failed check to
The following are some sample programs that can be resolve a countermeasure obstacle; only one delaybot can
created using the coding task for the Computers skill (page be deployed per dynamic hacking phase). You then attempt
47). A program has a maximum item level of 10. Deploying another Computers check against the same DC, with a
a program in a dynamic hacking encounter takes a minor circumstance bonus equal to the delaybot’s level. On a
action. Programs are single-use items, though their durations success, that countermeasure is suppressed for 1 round (or,
vary by program. within a dynamic hacking encounter, that countermeasure’s
countdown value increases by 1).

FIGHTBOT
Fightbot programs are designed to help you deal with other
hackers and automated countermeasures. A fightbot can be
used only in a dynamic hacking encounter, acts as a support
hacker, and can only perform the aid minor action to assist the
lead hacker against a countermeasure obstacle. A fightbot’s
Computers skill bonus is equal to 5 + 1-1/2 × its level. A
fightbot program lasts for 1 dynamic hacking encounter.

HEALBOT
Healbot programs are designed to restore damage sustained
during a dynamic hacking encounter. When deployed, a
healbot restores a number of CP to a designated target equal
to 1d6 + the healbot’s level. Once it has healed a persona, the
healbot program deactivates.

LOCKOUT VIRUS
Viruses are nasty pieces of code designed to throw a monkey
wrench into the everyday workings of a computer system.
While more complex viruses exist, a lockout virus, after 1
minute of being deployed into a system, forces any user
(even those with root access) to hack into the system for
regular access. The lockout virus’s level functions as the tier
of computer the user needs to hack to gain access, regardless
of the tier of computer the virus has been deployed on. A
lockout virus lasts until one person successfully hacks into
the system it was deployed on.

SEARCHBOT
Searchbot programs can search a system for a single
designated piece of data with a Computers skill bonus equal
hacktivist to 10 + its level. Searchbots are active until the data is found
or they fail three times.

48
HACKTIVIST (ARCHETYPE) spoof grenades not used before you take a full night’s rest
In the same way that conventional hackers manipulate the become inert and unusable.
code of computer networks and security systems, hacktivists
use their skills to operate and modify smaller devices on the Improved Spoof Grenades (Ex) 6thLevel

fly in support of a cause. Often acting to expose corruption or When you create your spoof grenades during your daily INTO THE
facilitate freedom of information and technology, hacktivists preparations, you can choose to have a spoof grenade deal DATAVERSE
flock to wherever they see oppression and sometimes act nonlethal acid, cold, electricity, fire, or sonic damage instead
outside the boundaries of law. of nonlethal bludgeoning damage. In addition, add the
Because of the clandestine nature of their typical following conditions to the list of those you can imbue into
methods, hacktivists are difficult to find. Digital manuals a spoof grenade: blinded, deafened, shaken, and sickened. A CHAPTER 1:
circulating around certain infosphere sites include Hack the spoof grenade that imparts the shaken condition counts as LOGGING IN
System! and The Neo-Hacker’s Guide to Fun and Profit, acting a fear effect, and a spoof grenade that imparts the sickened
as training tools for burgeoning hacktivists. Servers show condition counts as a poison effect. Finally, by spending 1
a marked increase in downloads of these files whenever an Resolve Point during your daily preparations, you can have
CHAPTER 2:
organization acts in a particularly reprehensible manner, but one of your spoof grenades function as any non-magical ACCESS
due to their illegality, only those with a measure of hacking grenade of an item level equal to your character level – 2 GRANTED
skill can hope to find them. (instead of its usual effects). At 9th level, when you spend
1 Resolve Point during your daily preparations to have a CHAPTER 3:
PREREQUISITE spoof grenade function as another grenade, you can alter HARD
You must have 2 ranks in Computers to take this archetype. up to 3 spoof grenades in this manner, each of which can be
separate types (your choice).
RESET
ALTERNATE CLASS FEATURES
The hacktivist archetype grants alternate class features at Remote Cracker (Ex) 9th Level

2nd, 4th, 6th, and 9th levels. During your daily preparations, you can also create a
number of wireless key cracks equal to your Intelligence CONTINUING
By the Book (Ex) 2nd Level
modifier. When used as a standard action, a wireless key THE
Hacktivists are adept at quickly finding pertinent information crack functions as the technomancer spell remote operation CAMPAIGN
on how mechanical systems work within digitized manuals (Starfinder Character Operations Manual 140), with a caster
and on infosphere sites, especially information located in level equal to your character level (you still must concentrate
obscure parts of an infosphere. As long as you have access to maintain its effects). The effect of these wireless key
ADVENTURE
to an infosphere or downloaded data set, you can use the cracks is technological in nature. While the key cracks can be TOOLBOX
Computers skill instead of Engineering to arm explosives, affected by items that target technology, they’re immune to
disable a device, identify technology, or repair an item. You spell resistance and anti-magic effects (such as dispel magic).
can use this ability to make repairs on starships and starship
systems outside of starship combat but not for any engineer SPELLS OF GRIMOIRE 2.1
actions during starship combat. The infosphere site Grimoire 2.1 is well-known among
technologically minded spellcasters. Mysterious coders of
Spoof Grenades (Ex) 4th Level
Grimoire 2.1 developed these spells, which are available to any
You’ve learned how to create special high-tech grenades to character with access to the appropriate spell list.
assist in getting you into and out of trouble in non-digital
space. You gain Grenade Proficiency as a bonus feat. During EDIT CODE TECHNOMANCER 2

your daily preparations, you can craft a number of “spoof WITCHWARPER 2

grenades” equal to your Intelligence bonus (minimum 1). A School enchantment (compulsion)
spoof grenade functions like a normal grenade, including Casting Time 1 reaction
having a range increment of 20 feet. A spoof grenade Range close (25 ft. + 5 ft./2 levels)
has the explode weapon specialty property with a radius Targets one creature with the technological subtype
of 10 feet and deals an amount of nonlethal bludgeoning Duration instantaneous
damage equal to your level, as well as imparts a condition Saving Throw none; Spell Resistance yes
chosen from the following list at creation: dazzled, flat- You can cast edit code as a reaction when a target creature
footed, or off-target. This condition lasts for 1d4 rounds. within range attempts an ability check, attack roll, saving
A creature in the area of effect who succeeds at a Reflex throw, or skill check. You manipulate the creature’s code in
saving throw (DC = 10 + half your character level + your such a way that causes it to roll twice and take the worse
Intelligence modifier) halves the damage and negates the result. Casting this spell requires a great deal of energy, so
condition. Only you can use these spoof grenades, and any you must spend 1 Resolve Point.

49
PROBABILITY PREDICTION, MASS PRECOG 5 damage as a result of missing code; the target can attempt a
TECHNOMANCER 5 WITCHWARPER 5 Fortitude save to halve this damage.
School divination
Range close (25 ft. + 5 ft./2 levels) RENDER TECHNOMANCER 5 WITCHWARPER 5

Targets up to one creature/level, no two of which can be School illusion


more than 30 ft. apart Casting Time 1 standard action
Saving Throw Will negates (harmless); Spell Resistance Range see text
yes (harmless) Effect see text
This spell functions as probability predication, except as Duration see text
noted above. Saving Throw Will disbelief (if interacted with); varies; see
text; Spell Resistance yes; see text
REFORMAT MYSTIC 4 TECHNOMANCER 4 This spell creates a digital representation of an extraplanar
WITCHWARPER 4 creature, object, or magical effect. Render can mimic any
School necromancy (curse) conjuration (creation) or conjuration (summoning) spell of 4th
Casting Time 1 standard action level or lower. These digital representations are made up of
Range close (25 ft. + 5 ft./2 levels) hardlight and code and are only one-fourth (25%) as strong
Targets one creature with the technological subtype as the real things, though creatures that believe the rendered
Duration 1 round/level representations are real are affected by them at full strength.
Saving Throw Will negates and Fortitude half; Spell Any creature that interacts with the effect of the spell can
Resistance yes attempt a Will saving throw to recognize its true nature. A
This spell attacks the target creature’s programming, erasing creature that succeeds at its save sees the rendered effect
important subroutines that allow the creature function. It’s as translucent digital representations with a small amount of
banned on several tech-heavy worlds like Aballon. pixelation around the image’s edges.
If the target fails the initial saving throw, then for the Spells that deal damage have normal effects unless the
duration of the spell, there’s a 50% chance the target is affected creature succeeds at a Will save. Each disbelieving
staggered for 1 round at the start of its turn. During any creature takes only one-fourth (25%) damage from the
round the target isn’t staggered due to this spell, it takes 8d6 representation’s attack. If the disbelieved attack has a

50
special effect other than damage, it’s only 25% likely to time on a summoned creature immediately ends the first
occur. Regardless of the result of the save to disbelieve, casting’s benefits.
an affected creature is also allowed any save that the spell • The summoned creature’s maximum Hit Points
being simulated allows, but the save DC is set according increases by 10%.
to render’s level (5th) rather than the spell’s normal level. • The Armor Class of the summoned creature increases INTO THE
In addition, any effect created by render allows spell by 2. DATAVERSE
resistance, even if the spell it’s simulating doesn’t. Rendered • The summoned creature gains a +1 bonus to all
objects or substances have normal effects except against attack rolls.
those that disbelieve them. Against disbelievers, they’re • One of the summoned creature’s attacks deals an
25% likely to work. additional die of damage of the same size. CHAPTER 1:
A rendered hardlight creature has one-fourth the Hit • When the summoned creature makes a full attack, LOGGING IN
Points of a normal creature of its kind (regardless of whether it can also take a separate move action to move.
it’s recognized as a digital representation). It deals normal The movement can occur before, after, or between
damage and has all normal abilities and weaknesses. Against the attacks from the full attack. All movement must
CHAPTER 2:
a creature that recognizes it as a digital representation, occur at the same time. (This benefit doesn’t stack ACCESS
however, the rendered creature’s damage is one-fourth (25%) with the benefits of haste.) GRANTED
of the normal damage, and all special abilities that don’t deal
lethal damage are only 25% likely to work as normal. (Roll for UPGRADE SUMMON, GREATER MYSTIC 4
CHAPTER 3:
each use and affected character separately.) TECHNOMANCER 4 WITCHWARPER 4
HARD
School transmutation
SENSOR MASK TECHNOMANCER 3 This spell functions as upgrade summon, except that you
RESET
WITCHWARPER 3 can apply two of the listed benefits above to the target
School illusion summoned creature.
Casting Time 1 standard action
Range touch THE RIGHT TOOLS FOR THE JOB CONTINUING
Target one creature The stereotypical view of hackers and technomancers paints THE
Duration 10 minutes/level (D) them as hunched over a computer terminal in a dark and CAMPAIGN
Saving Throw Will negates (harmless); Spell Resistance yes dingy room, but most code jockeys know that, sometimes,
(harmless) they need to get their hands dirty. The following tools
Using a complicated digital program encoded on a magical and other pieces of equipment can assist those who find
ADVENTURE
subroutine, the target’s digital footprint attempts to match themselves thrust into adventure. TOOLBOX
information stored in local security databases. When
attempting to bypass automated technological security ARMOR
(such as biometric scanners or facial recognition programs), When the laser blasts and bullets start flying, it’s always
the target gains a +10 circumstance bonus to any related a good idea to be protected. Many hackers rely on the
skill checks (usually Computers or Disguise) attempted following sets of armor in the field.
for the duration of the spell. This doesn’t alter the target’s
physical appearance, so it doesn’t fool sapient beings. CAMPING GEAR
Camping gear was originally called “field surveillance and
UPGRADE SUMMON MYSTIC 2 munitions armor” when it was developed for Veskarium
TECHNOMANCER 2 WITCHWARPER 2 military support personnel. The armor consists of
School transmutation overlapping plates of non-conductive flexible plates to
Casting Time 1 standard action protect field technicians and computer specialists on the
Range close (25 ft. + 5 ft./2 levels) battlefield. However, as Veskarium technology began to
Target one summoned creature become more popular in the Pact Worlds, vidgamers took to
Duration 1 round/level calling the suit of rigid plates “camping gear,” as a reference
Saving Throw Will negates (harmless); Spell Resistance to the competitive gaming tactic of lying in wait to ambush
yes (harmless) foes. Much to the chagrin of the Veskarium military, the
This spell temporarily empowers the abilities of a summoned name has stuck and spread into the vernacular.
creature. When you cast this spell, choose one of the
following benefits. This upgrade lasts for the spell’s duration DEVWEAR
or until the summoned creature is dismissed or returns to Devwear was developed as a line of haptic feedback
its native plane. A summoned creature can only benefit from interactivity gear. The tight-fitting black surface is lined
one of these upgrades at a time; casting this spell a second with bright chrome circuitry that almost shimmers with

51
the data pulsing within. A suit of devwear comes standard stores continuous data (like a camera feed), the computer
with an interface that acts as a datajack that doesn’t count won’t be able to recover the missing data. If the data is part
against the armor’s upgrade slots or as an augmentation for of the computer’s countermeasure modules or controls a
the wearer. Devwear I acts as a standard datajack, devwear technological trap, you must also succeed at a Computers
II acts as a high-density datajack, and the newly released check to hack (DC equals the normal DC to hack that computer
devwear III acts as an accelerated datajack. or the disable DC of the trap). Failing this check sets off the
countermeasures or the trap.
TROUPESUIT Once you use your deletion pads, you can’t use them again
Troupesuits were initially intended for infosphere until you’ve rested to regain Stamina Points, though you can
programming, holovid personalities, musical performances, spend 1 Resolve Point at any time to recharge the deletion
and gladiatorial combat. Troupesuits contain hundreds of pads immediately.
holo-projectors, micro-imaging enhancers, and high-fidelity
speaker systems to allow the wearer to project bright, colorful HYBRID GEAR
images and music over the armor’s surface. Hybrid gear favored by hackers is often regular technological
Troupesuit displays are programmed through the use of the equipment given somewhat magical capabilities.
wearer’s personal comm unit or a more advanced computer
LEVELS 2-6
system, and they can display an image up to one size larger Hackbot
than the wearer. However, the images are artistically rendered PRICE VARIES BULK —
and lack the realism necessary to be considered an illusion. Hackbots are semi-sentient programs designed to give the user
access to a system. They were initially created to test security
MAGITECH AUGMENTATIONS protocols but were eventually leaked to criminal groups, and
Magitech augmentations require the mastery of both precision now hackbots are a relatively inexpensive way to gain access
surgery and arcane theory, as they combine the technological to unguarded computer terminals without paying for dedicated
and the magical into a single piece of equipment. computer specialists. For seasoned hackers, hackbots are useful
SYSTEM
assistants that can usually gain basic access while the hacker
DELETION PADS One Hand checks for shell programs or other intrusion countermeasures.
PRICE 2,000 LEVEL 4 The existing models of hackbots have limited capabilities; a
The fingertips on one of your hands are branded with glowing hackbot is ineffective on any computer whose tier is equal to or
mystic sigils that can subtly erase data from a computer higher than twice the hackbot’s item level.
system you touch. As a standard action, you can delete up You must have physical access to a computer to install a
to 1,500 words (such as data from a file or lines of computer hackbot into the system, and you can do so as a full action.
code) from a computer you touch whose tier is no higher Like software imps (Starfinder Armory 124), hackbots are
than half your level. Computers generally keep backups on housed on memory sticks and can only operate while the
a round-by-round basis, and when you erase information memory stick is inserted into a system. As the program
from a computer, it takes 1 round for the computer to access never truly leaves the memory stick, if the stick is removed,
its backups, though if that code is part of a program that their attempts to gain access to a computer system cease

LIGHT ARMOR
Armor Model Level Price EAC KAC Maximum Armor Check Speed Upgrade Bulk
Bonus Bonus Dex Bonus Penalty Adjustment Slots

Devwear I 3 1,400 +2 +2 +6 — — 1 L

Camping gear I 4 1,850 +4 +6 +4 –1 — 0 1

Troupesuit I 5 2,600 +6 +4 +5 –1 — 2 L

Devwear II 6 4,450 +5 +5 +6 — — 2 L

Troupesuit II 8 8,800 +11 +9 +5 –1 — 3 L

Devwear III 9 13,500 +11 +11 +6 — — 3 L

Camping gear II 10 18,450 +12 +14 +5 –1 — 1 1

Troupesuit III 12 35,000 +16 +13 +6 –1 — 4 L

52
LEVELS 4-8
immediately, though once its memory stick is removed, a Data Perusal Unit (worn)
hackbot can be reused. A hackbot can only access unsecured PRICE VARIES BULK L
systems, gain root access, or hack systems using the Data perusal units are usually fashioned as thin, metallic
Computers skill bonus listed for its model, as directed by you headbands covered in visible circuitry that hold two small
(this takes no action). A hackbot works for 10 minutes or until magical stones to the wearer’s temples. When in a region where INTO THE
it triggers a countermeasure, whichever comes first, at which an infosphere or some other form of data network is wirelessly DATAVERSE
point it shuts down. accessible (most technologically average settlements and
planets), a data perusal unit can instantly access, sort, and
Model Level Price Computers Skill Bonus disseminate information from that infosphere according to

Mk 1 2 550 +8
your desires. A data perusal unit is automatically activated CHAPTER 1:
when you attempt a skill check to identify a creature, identify LOGGING IN
Mk 2 5 2,800 +13 a spell, identify technology, or recall knowledge with a skill
you aren’t trained in. Thanks to the instantaneous knowledge
Mk 3 10 17,250 +20 dump, you’re considered trained in that skill. More advanced
CHAPTER 2:
models offer an additional bonus to the check. ACCESS
GRANTED
LEVEL 8
Teambuilding Charm (worn) Model Level Price Benefit
PRICE 9,000 BULK —
You’re considered trained in CHAPTER 3:
Mk 1 4 2,000
These circular, glowing green charms show a constant stream the skill being accessed. HARD
of data across their tiny screens and are sold in pairs. A
single teambuilding charm is usually affixed to a bracelet or
As the mk 1, and you gain a RESET
Mk 2 6 4,200 +2 enhancement bonus to
necklace, but it can be worn as a ring or piercing. When a this check.
group of two or more individuals, each willingly wearing a
As the mk 1, and you gain a
teambuilding charm, stay within close proximity of each Mk 3 8 9,100 +4 enhancement bonus to
other (100 feet or less) for 24 hours, the charms attune to this check. CONTINUING
each other and their users. For another teambuilding charm to THE
be added to the group, the existing charms must be reset by CAMPAIGN
being removed for 24 hours. WEAPON FUSIONS
Once at least two teambuilding charms are attuned to each The following weapon fusions take advantage of recent
other, they give subtle psychic information to the wearer technomagical innovations.
ADVENTURE
on the health of each of the other wearers no matter the TOOLBOX
LEVEL 6
distance, as long as they’re on the same plane of existence. DATA SPIKE
If the bearer of one of the charms falls ill or ceases to live, The data spike fusion imbues a weapon with technomagical
the others are instantly aware of their status. As a standard code that can infect living creatures’ nervous systems,
action, a charm wearer can activate their charm to determine causing them to almost lose control of their limbs. When
the direction and distance of another charm wearer as long as you score a critical hit on a living creature with a weapon
they’re on the same planet. Beyond direction and status, no that has the data spike fusion, the target must succeed at a
other information is given. Fortitude saving throw or its movement speeds are halved,
and it’s flat-footed for 1d4 rounds. If the weapon already has
a critical hit effect, when you score a critical hit, you can
apply either the weapon’s normal critical hit effect or the
data spike effect. Only powered melee weapons can benefit
from this fusion.

LEVEL 6
HACKED CODE
A weapon with the hacked code fusion crackles with
disruptive digital energy. When you score a critical hit on a
creature with the technological subtype with a weapon that
has the hacked code fusion, the target must succeed at a Will
saving throw or be dazed for 1 round as the energy invades the
creature’s subsystems. If the weapon already has a critical hit
effect, when you score a critical hit, you can apply either the
weapon’s normal critical hit effect or the hacked code effect.
teambuilding charm Only a non-analog weapon can benefit from this fusion.

53
CR XP
AMP-LION 13 25,600

N Huge vermin Offensive Abilities mag-well (15-ft.-burst, 5d6 E plus pulled


Init +4; Senses blindsense (scent [metal and plastic only]) 10 ft., DC 19), scrapper, swallow whole (3d12+21 A, EAC
60 ft., blindsense (vibration) 30 ft., darkvision 60 ft.; 27, KAC 25, 56 HP)
Perception +23 STATISTICS
Aura electromagnetic field (30 ft., Fortitude DC 19) Str +8; Dex +4; Con +6; Int —; Wis +1; Cha –3
DEFENSE HP 225 Skills Athletics +28, Survival +23
EAC 27; KAC 29 Other Abilities mindless
Fort +17; Ref +15; Will +12 ECOLOGY
Immunities electricity; Resistances acid 10 Environment any warm
Weaknesses vulnerable to sonic Organization solitary or pair
OFFENSE SPECIAL ABILITIES
Speed 30 ft., burrow 20 ft. Corrosive Spit (Ex) As a ranged attack, an amp-lion can
Melee bite +26 (3d12+21 A & P plus swallow whole; critical spray a jet of acid from its stomach with a range of 60
corrode 1d6) or feet. This attack has the line and unwieldy properties.
claw +26 (2d12+21 S plus grab) Electromagnetic Field (Ex) The amp-lion’s complex digestive
Ranged corrosive spit +23 (5d6+13 A; critical corrode 1d6) system emits a weak but constant electromagnetic field
Space 15 ft.; Reach 10 ft. (15 ft. with claws) as it breaks down electronics. A technological construct
that begins its turn in this aura is staggered for 1 round
(DC 19 Fortitude negates).
Mag-Well (Ex) Once every 1d4 rounds as a standard action,
an amp-lion can surge with electrical power, drawing in all
unattended metal and technological objects within 15 feet
toward it. Each creature in the area takes 6d6 electricity
damage, and technological constructs, as well as those
wielding or wearing powered weapons or wearing
powered armor, are pulled 10 feet closer to the amp-lion.
This movement doesn’t provoke attacks of opportunity. A
creature takes half the damage and negates the pull effect
with a successful DC 19 Reflex save.
Scrapper (Ex) An amp-lion’s stomach acid is perfect for
tearing apart electronic devices for digestion. An amp-lion
gains a +4 racial bonus to sunder combat maneuvers, and
damage from its bite and corrosive acid attacks treats the
hardness of objects made of metal and plastic as 10 lower
than normal. In addition, an amp-lion can burrow through
metal and plastic as though it were dirt.

Amp-lions are massive invertebrate insects that evolved to feed


on inorganic matter, usually technological scrap, live wires,
and plastic deposits. Different amp-lion species appear on
various technologically advanced planets, differing in shape,
coloration, and number of appendages, but all share
the ability to digest materials used for technological
production. Underground amp-lion dens can be detected
by tracing the creatures’ weak electromagnetic field.
Even a solitary amp-lion poses a dangerous threat, as
they’re known to swallow whole robots and those
wearing heavy powered armor. Exterminating just
one of these vermin could require a large group of
skilled warriors wielding analog weapons.

54
TIER XP
ASTRAL DEVOURER 9 varies

N Medium starship construct monomolecular nanite weapons, the target starship is INTO THE
Speed 8; Maneuverability good (turn 1); Drift 1 infected with hull-eating nanites that deal 4d6 damage DATAVERSE
AC 23; TL 22 each round at the end of the engineering phase, ignoring
HP 270; DT —; CT 54 DT. The nanites continue to destroy the hull even if shields
Shields medium 160 (forward 40, port 40, starboard 40, are later restored to the affected quadrant. As a crew
aft 40) action, a starship’s engineer can vent plasma, superheat CHAPTER 1:
Attack (Forward) monomolecular nanite railgun (8d8, 10 the hull, or perform a similar action to destroy the LOGGING IN
hexes), singularity beam (3d6 plus EMP, 5 hexes) infestation with a successful DC 23 skill check.
Attack (Aft) monomolecular nanite railgun (8d6, 10 hexes) Regeneration (Ex) An astral devourer automatically regains
Attack (Turret) particle laser array (3d6, 10 hexes) 9 Hit Points at the start of each engineering phase, up to
CHAPTER 2:
Power Core singularity (250 PCU); Drift Engine Signal Basic; its maximum number of Hull Points. ACCESS
Systems mk 4 armor, mk 3 defenses; Expansion Bays none GRANTED
Other Abilities living starship, monomolecular nanite “Astral devourer” is the colorful name given to the starship-
infestation (DC 23), regeneration, void adaptation sized clouds of corrupted nanites that prowl the outskirts CHAPTER 3:
CREW ACTIONS of systems, where they seek abandoned space stations and HARD
Engineer (1 actions) Engineering +17 (9 ranks) isolated vessels to consume the leftover technology within.
Gunners (2 actions) gunnery +15 (9th level) These clouds often take on the appearance of star-shaped
RESET
Pilot (1 action) Piloting +18 (9 ranks) vessels that hold the fragment of a singularity or brilliant
Science Officer (1 action) Computers +22 (9 ranks) star, which functions as their power source and, effectively,
ECOLOGY as their power core. No one knows for certain where these
Environment any vacuum or the Drift originating nanites that comprise CONTINUING
Organization solitary astral devourers came from; THE
SPECIAL ABILITIES however, some historians have CAMPAIGN
Living Starship (Ex) An astral devourer is a living creature so proposed outlandish theories that
immense that it functions as a starship (and thus engages some long-dead technologically
only in starship combat). It has no crew, but it can still take advanced civilization
ADVENTURE
engineering, gunner, pilot, and science officer actions using manufactured them. Others TOOLBOX
the skill bonuses, ranks, and level listed above. Modifiers posit that astral devourers
for its size, speed, and maneuverability have already been resulted from a time travel
factored into its statistics. Use the table below whenever experiment to the distant
the astral devourer takes critical damage. the future gone awry.
D% System Effect The exact reason
remains a mystery.
Randomly determine one arc
containing weapons; condition
1–30 Weapons Array
applies to all gunner actions
using weapons in that arc.
Condition applies to all pilot
31–60 Propulsion
actions.
During the next round, the
Regenerative
61–90 astral devourer’s regeneration
Array
ability doesn’t function.
During the next round, each of
the astral devourer’s attempted
91–100 Singularity
actions has a 25% chance of
failure.

Monomolecular Nanite Infestation (Ex) An astral devourer


is made up of trillions of microscopic robots that
regenerate its body and feed on nearby technology. If an
astral devourer deals Hull Point damage with one of its

55
CR XP
CABLE SERPENT 13 25,600

CN Small construct (magical, technological) Languages Common (can’t speak); shortwave 100 ft.
Init +6; Senses darkvision 60 ft, low-light vision; Other Abilities chaotic exodus, unliving, welding restoration
Perception +23 ECOLOGY
DEFENSE HP 190 Environment any
EAC 26; KAC 27 Organization solitary or bundle (2 or more)
Fort +10; Ref +10; Will +14 SPECIAL ABILITIES
Immunities construct immunities, electricity Chaotic Exodus (Ex) When a cable serpent rips itself out of
OFFENSE a piece of technology as part of its creation, its former
Speed 30 ft., climb 30 ft. host object or vehicle gains the broken condition (if the
Melee bite +21 (6d4+16 P & E) object is part of a starship, a random system gains the
Ranged electroshock +23 (2d10+13 nonlethal E; critical glitching condition), and the cable serpent gains the
stunned [DC 21]) confused condition for 1d4 rounds.
Spell-Like Abilities (CL 13th; melee +21) Electroshock (Ex) As a ranged attack, a cable serpent can
1/day—furious shriekGM (5th level, DC 24), synapse fire a burst of static electricity at a foe. This attack deals
overload (DC 24) nonlethal electricity damage, has a range increment of
3/day—dimension door, overload systems (DC 23), 30 feet, and has the possibility of stunning the target on
resistant armor, rewire flesh (DC 23) a critical hit.
At will—arcing surge (DC 22), discharge (DC 22) Shortwave (Ex) A cable serpent can communicate
STATISTICS wirelessly. This acts as telepathy, but only with other
Str +3; Dex +6; Con —; Int +8; Wis +2; Cha +4 creatures with this ability or constructs with the
Skills Acrobatics +23, Athletics +23 (+31 to climb), technological subtype.
Engineering +28, Mysticism +28 Welding Restoration (Su) A cable serpent can expend a spell
slot to restore a number of Hit Points to an object or a
construct as per a mystic cure spell of the same level as
the slot sacrificed. When used on constructs with spell
resistance or immunity to magic, this ability bypasses
those defenses. A cable serpent can also use this ability to
remove the broken condition from a piece of technology
damaged by a cable serpent’s chaotic exodus.

The interplay of forces technological and


mystical can sometimes result in the formation
of sentience, under the right circumstances. Cable
serpent is the colloquial name given to bundles
of conductive wires and similar technology that
have come to life when suffused with enough
magic. After twisting free from a host piece of
technology, the ophidian-like creature seeks
to make sense of their place in the universe.
Unfortunately, the chaotic nature of a cable serpent’s
emergence causes most onlookers to react with
hostility, usually resulting in death and the destruction
of property. However, a cable serpent can become
an extremely valuable and powerful ally to those
who can quickly recognize what’s before them.
The first confirmed and documented cable serpent
discovered was born on Aballon, at the site of a
Drift beacon construction facility. This creature named
themself Neshust and has since founded a small commune for
others of their kind.

56
CR XP
MAGAZINE OOZE 10 9,600

N Tiny ooze presence within the weapon. The ooze can leave the INTO THE
Init +8; Senses blindsight (vibration) 60 ft., sightless; weapon as a move action but is forced out if the weapon DATAVERSE
Perception +19 gains the broken condition or if a character succeeds at a
DEFENSE HP 160 DC 30 Engineering check as a full action.
EAC 23; KAC 25 Muzzle Jam (Ex) As a full action, a magazine ooze can
Fort +14; Ref +10; Will +7 partially merge with a small arm, longarm, heavy CHAPTER 1:
Immunities ooze immunities weapon, or sniper weapon being carried or wielded LOGGING IN
OFFENSE by a creature to which the ooze is attached unless
Speed 30 ft. the creature succeeds at a DC 19 Reflex saving throw.
Melee attach +22 or Attacks made with an affected weapon take a –2 penalty
CHAPTER 2:
pseudopod +19 (2d10+15 B) to attack and damage rolls and can’t deal extra critical ACCESS
Space 2-1/2 ft.; Reach 0 ft. effects on a critical hit (but still deal double damage) GRANTED
Offensive Abilities alter grip, muzzle jam (DC 19), surprise until the end of the creature’s next turn. A creature can
attack (+22) remove this condition before then with a successful DC CHAPTER 3:
STATISTICS 25 Engineering check as a standard action. HARD
Str +5; Dex +8; Con +3; Int —; Wis +2; Cha –2 Surprise Attack (Ex) While inhabiting an unattended
Skills Stealth +24 firearm, the magazine ooze can cause it to discharge
RESET
Other Abilities inhabit firearm as a standard action, attacking one creature within the
ECOLOGY weapon’s first range increment. The target is flat-footed
Environment any against this attack, which is made with a +22 bonus and
Organization solitary or armory (3–5) deals the weapon’s normal damage. The save DC for the CONTINUING
SPECIAL ABILITIES weapon’s critical hit effect (if any) is 17. THE
Alter Grip (Ex) As a reaction when a character attacks CAMPAIGN
with the weapon that the magazine ooze is inhabiting, The first documented encounter with magazine oozes
the magazine ooze can shift the aim of the weapon to happened while a Veskarium military expedition collected
change the target of the attack. The attack is made with weapons from fallen enemies. The soldiers survived the
ADVENTURE
a –4 penalty against the new target, and the attacking random bursts of fire from unattended weapons, and when TOOLBOX
character must succeed at a DC 17 Reflex saving throw they discovered the cause, they affectionately named the
or drop the weapon. If the attacking character holds onto oozes “gun jams.” Further research suggests magazine oozes
the weapon and was making multiple attacks that round, might have been created by an unknown civilization, who
those additional attacks are made as normal. developed these devious living weapons to cause havoc
Inhabit Firearm (Ex) As a standard action, a magazine among enemy military encampments. Whether or not these
ooze can distribute itself throughout a non-broken, creators fell victim to their own inventions, however, remains
unattended small arm, longarm, heavy weapon, or a mystery.
sniper weapon in its space that has an item level
no higher than the ooze’s CR. While inhabiting a
weapon, the magazine ooze has total cover
and can take no actions except for the
alter grip reaction, the surprise attack
offensive ability, and leaving its
inhabited firearm. It also uses
the weapon’s or its own saving
throw bonuses, whichever
is higher. While the ooze
inhabits a weapon, that
weapon appears normal, but
a character who succeeds at
a Perception check opposed
by the ooze’s Stealth check
can detect traces of the ooze’s

57
CR XP
PROGRAM CREATURE varies varies

UNWITTING SUBROUTINE CR 5 Languages Common, Vesk, Ysoki


XP 1,600 Other Abilities computerized mind (page 59),
Program android envoy constructed, data construct (page 59), envoy
Medium humanoid (android, technological) improvisations (get ‘em, hurry), flat affect, upgrade slot
Init +3; Senses darkvision 60 ft., low-light vision; (glamer projectorAR)
Perception +11 Gear business stationwear, sheet lightning pistolAR with 2
DEFENSE HP 78 high-capacity batteries (40 charges each), traditional
EAC 17; KAC 18 battle ribbon AR
Fort +4; Ref +6; Will +8; +2 vs. disease, poison, and sleep, ECOLOGY
+4 vs. mind-affecting effects Environment any virtual space
Weaknesses virtual dependency (page 59) Organization any
OFFENSE
Melee traditional battle ribbon +10 (1d8+6 S) HUGE FIREWALL CR 7
Ranged sheet lightning pistol +12 (1d6+5 E) XP 3,200
STATISTICS Program huge fire elemental (Starfinder Alien Archive 46)
Str +1; Dex +3; Con +0; Int +2; Wis +0; Cha +5 N Huge outsider (elemental, extraplanar, fire,
Skills Acrobatics +11, Bluff +11, Culture +16, Diplomacy +16, technological)
Sense Motive +11 Init +8; Senses darkvision 60 ft.; Perception +14
DEFENSE HP 105
EAC 19; KAC 21
Fort +11; Ref +9; Will +6; +4 vs. mind-affecting effects
DR 5/—; Immunities elemental immunities, fire
Weaknesses virtual dependency (page 59), vulnerable
to cold
OFFENSE
Speed 50 ft.
Melee slam +18 (2d6+12 B & F; critical burn 2d4)
Space 15 ft.; Reach 15 ft.
STATISTICS
Str +5; Dex +4; Con +2; Int –3; Wis +0; Cha +0
Skills Acrobatics +14, Athletics +14
Feats Mobility
Languages Ignan
Other Abilities computerized mind (page 59), data
construct (page 59)
ECOLOGY
Environment any virtual space
Organization solitary or pair

LURKING SPYWARE CR 10
XP 9,600
Program marsh gargantuan predator (Starfinder Alien
Archive 2 140, 102)
N Gargantuan animal (aquatic, technological)
Init +1; Senses blindsense (scent) 60 ft., low-light vision;
Perception +19
Skills Athletics +19, Stealth +19 (+27 while fully submerged
in water)
Other Abilities amphibious, computerized mind (page 59),
data construct (page 59)

58
OVERLORD ALGORITHM CR 13
XP 25,600 PROGRAM CREATURE
Program adult red dragon (Starfinder Alien Archive 39)
CE Huge dragon (fire, technological)
TEMPLATE GRAFT
Init +0; Senses blindsense (vibration) 60 ft., darkvision 120 Use the following template graft to create a program INTO THE
ft., low-light vision, sense through (vision [smoke only]); creature based on any existing creature or to make a DATAVERSE
Perception +23 new creation unique to a virtual space.
Aura frightful presence (190 ft., DC 19) Required Creature Type: Any.
DEFENSE HP 225 Suggested Array: Any.
EAC 27; KAC 29 Traits: Computerized mind (see below), data CHAPTER 1:
Fort +17; Ref +17; Will +14; +4 vs. mind-affecting effects construct (see below), virtual dependency (see below). LOGGING IN
DR 10/magic; Immunities fire, paralysis, sleep; SR 24 Computerized Mind (Ex): Program creatures gain a
Weaknesses virtual dependency (see below), vulnerable +4 bonus to saves against mind-affecting effects unless
to cold those effects specifically target constructs. A creature
CHAPTER 2:
can target a program creature with a spell that could ACCESS
OFFENSE
Speed 50 ft., 200 ft. (Su, clumsy) affect a computer or other technological device, such GRANTED
Melee bite +27 (2d12+21 P) as remote operation (Starfinder Character Operations
Multiattack bite +21 (2d12+21 P), 2 claws +21 (2d8+21 S), Manual 140), or a mechanic’s overload class feature. CHAPTER 3:
tail +21 (2d8+21 B) The program creature can attempt a Will saving throw HARD
Space 15 ft.; Reach 10 ft. (15 ft. with bite) to negate this effect, even if the effect doesn’t normally
Offensive Abilities breath weapon (cone 45 ft., 14d10 F, DC allow a saving throw; use the effect’s regular DC or a
RESET
19, usable every 1d4 rounds) DC of 10 + 1/2 the effect user’s level + the effect user’s
Spell-Like Abilities (CL 13th; ranged +24) key ability score modifier, whichever is higher. If the
1/day—crush skull (DC 20), waves of fatigue (DC 20) program creature fails this saving throw, they become
3/day—dimension door, greater invisibility, usurp spellGM, afflicted with one condition (chosen by the effect user) CONTINUING
wall of fire for the ability’s duration or a number of rounds equal THE
At Will—explosive blast (DC 18), slow (DC 18) to the effect user’s level, whichever is shorter. The CAMPAIGN
STATISTICS conditions that can be chosen include: blinded, confused,
Str +8; Dex +0; Con +6; Int +4; Wis +2; Cha +4 exhausted, frightened, or staggered.
Skills Athletics +28 (+20 to fly), Intimidate +23, Data Construct (Ex): Program creatures gain the
ADVENTURE
Mysticism +23 technological subtype and count as both their original TOOLBOX
Languages Common, Draconic, Ignan type and constructs for all effects (whichever type
Other Abilities computerized mind (see below), data allows an ability to affect them for abilities that affect
construct (see below) only one type, and whichever is worse for abilities
ECOLOGY that affect both types). A program creature receives
Environment any virtual space a +2 bonus to saving throws against disease, poison,
Organization solitary and sleep unless those effects specifically target
constructs. Non-program creatures wielding a hacking
Programs are semi-sapient creatures native to virtual spaces, kit can attempt to alter a nearby program creature’s
such as Triune’s Dataverse. Formed not from material subroutines, allowing them to attempt a Computers
elements but raw data, these creatures operate on complex checks to feint or lie to a program instead of using
algorithmic routines and subroutines that almost perfectly Bluff, change a program’s attitude instead of using
mimic those of real, thinking creatures. Diplomacy, bully or demoralize them instead of using
In many cases, these programs exist to act as guardians Intimidate, or to perform any skill task of the Medicine
over sensitive digital areas. Rather than trust valuable data skill instead of using Medicine.
strictly to a hackable server, some enterprises have embedded Virtual Dependency (Ex): A program creature can
their data to be accessible via entering digital worlds and exist only within the virtual space in which it was
contending with one or more programmed guardians. created. If forcibly removed from the virtual space,
The demon lord of clocks and prisons, Shivaska, is known it dies immediately, but computer backups in the
to force those she captures to toil in digital realms she hosts. virtual space usually recreate the program creature
In these places, the imprisoned work ceaselessly to mine a 1d4 minutes later. Directly modifying the code of the
digital currency known as SoulCoin, and corrupt programmed virtual space, or destroying its server, is the only way
creatures ensure obedience and maintain fear among the to ensure the destruction of a programmed creature.
digitized prisoners.

59
CR XP
ROBOT DRAGON varies varies

ASSAULT DISINTEGRATOR DRAGON CR 16 constructs (whichever allows an ability to affect them


XP 76,800 for abilities that affect only one of those types, and
NE Huge dragon (technological) whichever is worse for abilities that affect both types).
Init +10; Senses blindsense (vibration) 60 ft., darkvision 120 They receive a +2 racial bonus to saving throws against
ft., low-light vision; Perception +28 disease, mind-affecting effects, and poison unless those
Aura frightful presence (220 ft., Will DC 22) effects specifically target constructs. Additionally, they’re
DEFENSE HP 300 protected from environmental effects as if wearing
EAC 30; KAC 32 armor (of an item level equal to the dragon’s CR) with its
Fort +20; Ref +20; Will +16 environmental protection active.
Defensive Abilities void adaptation; DR 10/adamantine;
Immunities acid, paralysis, sleep; SR 27 Artificial constructs that house dragon souls much like android
Weaknesses vulnerable to sonic bodies house those of humanoids, robot dragons are built as
OFFENSE instruments of war. Each one is modeled around a specific
Speed 40 ft.; fly 200 ft. (Ex, clumsy) category of weapon, such as laser blasters or projectile firearms
Melee bite +28 (3d10+23 P) (Starfinder Alien Archive 4 100), though far more specialized
Multiattack bite +22 (3d10+23 P), 2 claws +22 (3d10+23 S), models exist. Perhaps the most infamous are the dreaded
tail slap +22 (3d10+23 B) disintegrator dragons, massive engines of destruction built
Ranged disintegrator cannon +31 (7d6+16 A; critical with nuclear fission chambers for hearts that enable them to
corrodeAR 4d6) unleash terrifying gouts of power that tear matter apart at
Space 15 ft.; Reach 15 ft. the molecular level. Shock dragons, on the other hand, favor
Offensive Abilities breath weapon (55-ft. cone, 17d6 A, Reflex speed over destructive power and are often used as quick
DC 22 half, usable every 1d4 rounds), crush (6d10+23 B) infiltrators and shock troops due to their mobility and ability to
STATISTICS stun opponents. Sonic dragons are the most obscure, and they
Str +7; Dex +10; Con +4; Int +5; Wis +4; Cha +4 have the ability to harness raw sound into earsplitting blasts of
Skills Acrobatics +33 (+25 to fly), Computers +28, Piloting incapacitating power.
+28, Sense Motive +28
Languages Common, Draconic ROBOT DRAGON
Other Abilities robotic, spaceflight
TEMPLATE GRAFTS
ECOLOGY
Environment any As with most dragons, a robot dragon’s size is based on
Organization solitary their CR. However, unlike biological dragons, whose size is
SPECIAL ABILITIES determined by their age, a robot dragon’s size is set when
Annihilation (Ex) A disintegrator dragon’s breath weapon constructed and is based on the robot dragon’s intended
and disintegrator cannon can completely reduce a target function (CR 3–4: Small, scout; CR 5–6: Medium, guard;
to only traces of fine dust. If either ability reduces CR 7–10: Large, trooper; CR 11–16: Huge, assault; CR 17–24:
a creature to 0 Hit Points, that creature’s body is Gargantuan, siegebreaker; CR 25: Colossal, warlord). A robot
destroyed (as per disintegrate). A creature can negate dragon has an extraordinary fly speed that’s based on jets
the utter destruction of their body by spending all its and functions in a vacuum. Their speed and maneuverability
remaining Resolve Points; this leaves it at 0 Hit Points are determined by their CR: CR 3–6: 150 ft. (Ex, average); CR
and unconscious but stable. 7–10: 200 ft. (Ex, average); CR 11–16: 200 ft. (Ex, clumsy);
Disintegrator Cannon (Ex) A disintegrator dragon’s head is CR 17–25: 250 ft. (Ex, clumsy). If a robot dragon is CR 11 or
built around a destructive proton-decoupler cannon that higher, they have the crush universal creature rule and spell
provides the dragon with a ranged attack that deals acid resistance equal to 11 + their CR. All robot dragons have the
damage, targets EAC, has a range increment equal to their robotic special ability (see above) and the spaceflight and void
breath weapon’s maximum range and the corrodeAR 2d6 adaptation universal creature rules.
critical effect (increase to 3d6 at CR 7, 4d6 at CR 11, 5d6
at CR 17, and 6d6 at CR 25), and the line and unwieldy DISINTEGRATOR DRAGON TEMPLATE GRAFT
weapon special properties. (CR 3+)
Robotic (Ex) For effects targeting creatures by type, Disintegrator dragons are engines of peerless destruction,
disintegrator dragons count as both dragons and able to reduce all in their wake to mere slag.

60
Required Creature Type and Subtype: Dragon CR 19); immunity to sonic; vulnerable to fire; land speed of
(technological). 100 feet; breath weapon (line 30 feet + 10 feet per 2 CR, 1d6
Suggested Alignment: Any evil. E + 1d6 per CR); discordant thrumming (see below), sonic
Traits: Blindsense (vibration) 60 feet; darkvision 120 feet; howlitzer (see below).
frightful presence (CR 14+, 60 feet + 10 feet per CR); DR 5/ Discordant Thrumming (Ex): Any creature that takes damage INTO THE
adamantine (CR 13+; increase to DR 10/adamantine at CR from a sonic dragon’s breath weapon or sonic howlitzer (see DATAVERSE
15, DR 15/adamantine at CR 17, DR 20/adamantine at CR 19); below) is off-target until the end of its next turn as its ears
immunity to acid; vulnerable to sonic; breath weapon (cone 15 quiver and ring from the sonic blasts. If a sonic dragon critically
feet + 5 feet per 2 CR, 1d6 A + 1d6 per CR); annihilation (page hits a creature with their sonic howlitzer or a creature rolls a
60), disintegrator cannon (page 60). natural 1 on its saving throw against the sonic dragon’s breath CHAPTER 1:
weapon, the creature becomes deafened for 2d10 minutes and LOGGING IN
SHOCK DRAGON TEMPLATE GRAFT (CR 3+) is knocked prone (or off-kilter if it’s in zero gravity), unless it
Shock dragons are quick-thinking and hyperactive, acting in succeeds at a Fortitude saving throw.
a blink of an eye and striving to accomplish their goals in the Sonic Howlitzer (Ex): As a ranged attack, a sonic dragon can
CHAPTER 2:
most direct manner possible. unleash blasts of sonic energy from their mouth. This attack ACCESS
Required Creature Type and Subtype: Dragon targets EAC, deals sonic damage, and has a range increment GRANTED
(technological). equal to their breath weapon’s maximum range. If a sonic
Suggested Alignment: Any neutral. dragon is CR 7 or higher, attacks with the sonic howlitzer CHAPTER 3:
Traits: Blindsense (vibration) 60 feet; darkvision 120 feet; benefit from sonic resonance (as the soldier gear boost). HARD
frightful presence (CR 14+, 60 feet + 10 feet per CR); DR 5/
adamantine (CR 13+; increase to DR 10/adamantine at CR 15, DR
RESET
15/adamantine at CR 17, DR 20/adamantine at CR 19); immunity
to electricity; vulnerable to cold; land speed of 100 feet; breath
weapon (line 30 feet + 10 feet per 2 CR, 1d6 E + 1d6 per CR);
hyper-circuit (see below), lightning lash (see below). CONTINUING
Hyper-Circuit (Ex): As a move action, a shock dragon can THE
overclock its body, gaining the benefits of a haste spell for a CAMPAIGN
number of rounds equal to their CR. Once a shock dragon
uses this ability, they can’t use it again for 10 minutes.
Lightning Lash (Ex): As a melee attack, a shock dragon
ADVENTURE
can unleash a charged whip crafted from adamantine and TOOLBOX
djezet from their mouth. This attack targets EAC, deals
electricity damage, and has the reach and stun weapon
special properties. If the shock dragon is CR 7 or higher,
attacks with the lightning lash benefit from electric arc (as
the soldier gear boost) and have the stunned critical hit effect.
A shock dragon gains a +2 bonus when using their lightning
lash to perform combat maneuvers, and if the dragon rolls a
natural 20 on such an attack, the target is also subjected to the
lightning lash’s critical hit effect (if any).

SONIC DRAGON TEMPLATE GRAFT (CR 3+)


Sonic dragons have bombastic personalities that always seek
to take charge of whatever situations they find themselves in,
often acting as though they love the sound of their booming
voices above all else.
Required Creature Type and Subtype: Dragon
(technological).
Suggested Alignment: Any chaotic.
Traits: Blindsense (vibration) 60 feet; darkvision 120
feet; frightful presence (CR 14+, 60 feet +
10 feet per CR); DR 5/adamantine (CR 13+;
increase to DR 10/adamantine at CR 15, DR
15/adamantine at CR 17, DR 20/adamantine at

61
generous funding from the Marixah Republic to construct
their space station within the Drift near one of the Drift
CODEX OF beacons attached to their sovereign space. The construction

WORLDS took just under a year and was performed mostly by


automated drones under MalWyrm control, so knowledge
of the structure’s secret chambers couldn’t accidentally leak
to the public. The name of the station was generated by an
algorithm, but The Champion of Worlds literature explains
ZELK-363 that it’s the name of one of the founders’ old vidgame avatars;
Drift-based Hacker and Vidgamer Collective while the MalWyrms falsified records of this avatar dating
Diameter: 1 mile; Mass: less than ×1/100 decades back, no such character ever existed. Shortly after
Gravity: ×1 (artificial) Zelk-363 became operable, the MalWyrms began to seek out
Location: The Drift professional vidgamers to legitimize the station’s existence
Atmosphere: Normal while moving in its own hackers under that cover.
Day: 24 hours (artificial); Year: 408 days Like most places in the Drift, Zelk-363’s exact location can
vary at any given point in time, but those who can find a
The small space station known as Zelk-363 is home to The specific set of astrogation coordinates (which aren’t widely
Champion of Worlds, a shell foundation created to be a front distributed) can pilot their vessels to find the station after
for the hacker collective known as the MalWyrms. To the making a Drift jump. Once they’ve docked and step inside,
public, The Champion of Worlds is a cutting-edge vidgamer visitors are bombarded with bright, flashing holoscreens and
training facility and competition arena where the best of the thumping music that make the station feel like a nightclub or
best from across the galaxy come to compete. In addition high-end arcade. Casual guests are free to peruse the public
to state-of-the-art HAC suites, luxury quarters, and studios vidgame consoles, while those who have come to participate
set up to stream frantic vidgaming action, Zelk-363 offers a in The Champion of Worlds training are usually seen to the
hidden computer den where MalWyrm hackers conduct their quarters they’ll use while here. MalWyrm hackers, however,
clandestine deeds. know to move to the rear of the station, where an archaic
Using diplomacy, bribery, and more than a little illegal vidgame cabinet stands in dim purple light. By “playing”
altering of computerized records, the MalWyrms secured this game and inputting a sequence of button presses and
joystick movements, the hacker unlocks the secret door
behind the cabinet. They can then quietly slip through to the
MalWyrms’ headquarters.
Hackers of all stripes have been inducted into the
MalWyrms over the years, and their efforts have
been equally varied. The collective is currently
overseen by Ascella Hyvael (N female lashunta
technomancer), who ensures her hackers have the
resources they need to pursue individual projects.
Thanks to her own hacking skills and the cunning
of other MalWyrms, she can procure all manner of
assets—security files, customized viruses, extortion
evidence, and even more dangerous information.
Ascella is also responsible for aiding those hackers who
get discovered by authorities (or to cut them off
completely should their actions be too flamboyant).
During the early days of the Drift Crisis,
Zelk-363 was cut off from the Material Plane, but
its inhabitants survived on stores of processed junk food
and energy drinks until they could contact the Marixah
Republic once again. Afterward, many of the vidgamers
and hackers found themselves stricken with claustrophobia
and needed to take some time away from the station. As
a result, Zelk-363’s corridors are emptier than usual, but
Zelk-363 Ascella is confident the collective will be up and running at
full capacity in a short time

62
COMING SOON! THE SCOURED STARS
Starfinder’s next Adventure Path takes the form of a robust
HARDCOVER ADVENTURES 256-page book that compiles one of Starfinder’s most
Starfinder makes the switch to hardback adventures! Moving iconic stories. Compiling 10 adventures and two multi-table
away from it’s bi-monthly releases, Starfinder Adventure interactives from Organized Play, the Scoured Stars Adventure INTO THE
Paths will start coming out as hardcover compilations that Path takes players from 1st to 15th level in a cinematic DATAVERSE
bring together several volumes worth of content into one campaign showcasing the rise of a slumbering god!
product. These hardbacks continue Starfinder’s tradition
of overarching campaigns with distinct volumes as well as SUBSCRIBE TO STARFINDER
appendices with new content for running and playing in ADVENTURE PATH CHAPTER 1:
these new stories. Look forward to bigger stories with more Don’t miss out on a single exciting volume—head over to LOGGING IN
room to experiment and all the content you need to run your paizo.com/starfinder and subscribe today to have the
campaigns in one convenient product! Starfinder Roleplaying Game, Starfinder Adventure Path,
Starfinder Accessories, and even more products delivered
CHAPTER 2:
straight to your door! ACCESS
GRANTED
Open Game License Version 1.0a PAIZO INC.

CHAPTER 3:
Copyright 2000 Wizards of the Coast, Inc. (“Wizards”). All Rights Reserved. Creative Directors • James Jacobs and Luis Loza
1. Definitions: (a) “Contributors” means the copyright and/or trademark owners who have Director of Game Design • Jason Bulmahn
contributed Open Game Content; (b) “Derivative Material” means copyrighted material Director of Visual Design • Sonja Morris
including derivative works and translations (including into other computer languages),
potation, modification, correction, addition, extension, upgrade, improvement, compilation,
Director of Game Development • Adam Daigle
Development Manager • Linda Zayas-Palmer
Managing Creative Director (Starfinder) • Thurston Hillman
HARD
RESET
abridgment or other form in which an existing work may be recast, transformed or adapted; (c)
“Distribute” means to reproduce, license, rent, lease, sell, broadcast, publicly display, transmit Senior Developers • John Compton, Eleanor Ferron, and Jenny Jarzabski
or otherwise distribute; (d) “Open Game Content” means the game mechanic and includes the Developers • Vanessa Hoskins, Dustin Knight, and Landon Winkler
methods, procedures, processes and routines to the extent such content does not embody Lead Designer (Games) • Joe Pasini
the Product Identity and is an enhancement over the prior art and any additional content Organized Play Line Developers • Jessica Catalan, Josh Foster, and Shay Snow
clearly identified as Open Game Content by the Contributor, and means any work covered by Design Manager • Michael Sayre
this License, including translations and derivative works under copyright law, but specifically Pathfinder Lead Designer • Logan Bonner
excludes Product Identity. (e) “Product Identity” means product and product line names, Senior Designer • James Case
logos and identifying marks including trade dress; artifacts, creatures, characters, stories, Managing Editor • Leo Glass
storylines, plots, thematic elements, dialogue, incidents, language, artwork, symbols, designs, Lead Editor • Avi Kool

CONTINUING
depictions, likenesses, formats, poses, concepts, themes and graphic, photographic and other Senior Editors • Patrick Hurley, Ianara Natividad, and Simone D. Sallé
visual or audio representations; names and descriptions of characters, spells, enchantments, Editor • Solomon St. John
personalities, teams, personas, likenesses and special abilities; places, locations, environments, Art Directors • Kent Hamilton, Kyle Hunter, and Adam Vick
creatures, equipment, magical or supernatural abilities or effects, logos, symbols, or graphic
designs; and any other trademark or registered trademark clearly identified as Product
identity by the owner of the Product Identity, and which specifically excludes the Open Game
Senior Graphic Designer • Emily Crowell
Graphic Designer • Adriana Gasperi THE
CAMPAIGN
Production Designer • Danika Wirch
Content; (f) “Trademark” means the logos, names, mark, sign, motto, designs that are used by a
Contributor to identify itself or its products or the associated products contributed to the Open Director of Brand Strategy • Mark Moreland
Game License by the Contributor (g) “Use”, “Used” or “Using” means to use, Distribute, copy, Paizo CEO • Lisa Stevens
edit, format, modify, translate and otherwise create Derivative Material of Open Game Content. President • Jim Butler
(h) “You” or “Your” means the licensee in terms of this agreement. Chief Creative Officer • Erik Mona
2. The License: This License applies to any Open Game Content that contains a notice indicating
that the Open Game Content may only be Used under and in terms of this License. You must affix
such a notice to any Open Game Content that you Use. No terms may be added to or subtracted
Vice President of People & Culture • Maggie Gallagher
Vice President of Sales & Operations • Mike Webb
Vice President of Technology • Rei Ko
ADVENTURE
from this License except as described by the License itself. No other terms or conditions may be
applied to any Open Game Content distributed using this License.
Controller • Mary Webb
Sales Manager • Cosmo Eisele
TOOLBOX
3. Offer and Acceptance: By Using the Open Game Content You indicate Your acceptance of Sales & E-Commerce Assistant • Mika Hawkins
the terms of this License. Director of Licensing • John Feil
4. Grant and Consideration: In consideration for agreeing to use this License, the Contributors Marketing and Media Manager • Aaron Shanks
grant You a perpetual, worldwide, royalty-free, non-exclusive license with the exact terms of this
License to Use, the Open Game Content. Marketing and Licensing Coordinator • Raychael Allor
5. Representation of Authority to Contribute: If You are contributing original material as Open Director of Community • Tonya Woldridge
Game Content, You represent that Your Contributions are Your original creation and/or You have Organized Play Coordinator • Alex Speidel
sufficient rights to grant the rights conveyed by this License. Director of Project Management • Glenn Elliott
6. Notice of License Copyright: You must update the COPYRIGHT NOTICE portion of this Project Manager • Lee Aula
License to include the exact text of the COPYRIGHT NOTICE of any Open Game Content You Senior Accountant • William Jorenby
are copying, modifying or distributing, and You must add the title, the copyright date, and Finance Operations Specialist • B. Scott Keim
the copyright holder’s name to the COPYRIGHT NOTICE of any original Open Game Content Front End Engineering Lead • Andrew White
you Distribute. Senior Software Developer • Gary Teter
7. Use of Product Identity: You agree not to Use any Product Identity, including as an indication Software Architect • Brian Bauman
as to compatibility, except as expressly licensed in another, independent Agreement with the Software Developer • Robert Brandenburg
owner of each element of that Product Identity. You agree not to indicate compatibility or co- Software Test Engineer • Erik Keith
adaptability with any Trademark or Registered Trademark in conjunction with a work containing System Administrators II • Whitney Chatterjee and Josh Thornton
Open Game Content except as expressly licensed in another, independent Agreement with the
owner of such Trademark or Registered Trademark. The use of any Product Identity in Open Web Content Manager • Maryssa Mari
Game Content does not constitute a challenge to the ownership of that Product Identity. The Webstore Coordinator • Katina Davis
owner of any Product Identity used in Open Game Content shall retain all rights, title and interest Customer Service Lead • Austin Phillips
in and to that Product Identity. Customer Service Team • Jonathan Morgantini, James Oakes, Khangi Wampler,
8. Identification: If you distribute Open Game Content You must clearly indicate which portions and Jackson Wood
of the work that you are distributing are Open Game Content.
9. Updating the License: Wizards or its designated Agents may publish updated versions of this Warehouse Manager • Jeff Strand
License. You may use any authorized version of this License to copy, modify and distribute any Logistics Coordinator • Kevin Underwood
Open Game Content originally distributed under any version of this License. Warehouse Distribution Lead • Heather Payne
10. Copy of this License: You MUST include a copy of this License with every copy of the Open Warehouse Team • Alexander Crain, Summer Foerch, James Mafi, Zac Moran, Evan Panek, and
Game Content You distribute. Jesus Reynoso Ortiz
11. Use of Contributor Credits: You may not market or advertise the Open Game Content using
the name of any Contributor unless You have written permission from the Contributor to do so. This product is compliant with the Open Game License (OGL) and is suitable for use with Starfinder.
12. Inability to Comply: If it is impossible for You to comply with any of the terms of this Product Identity: The following items are hereby identified as Product Identity, as defined in the Open
License with respect to some or all of the Open Game Content due to statute, judicial order, or Game License version 1.0a, Section 1(e), and are not Open Game Content: All trademarks, registered
governmental regulation then You may not Use any Open Game Material so affected. trademarks, proper nouns (characters, deities, locations, etc., as well as all adjectives, names, titles, and
13. Termination: This License will terminate automatically if You fail to comply with all descriptive terms derived from proper nouns), artworks, characters, dialogue, locations, organizations,
terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All plots, storylines, trade dress, the historical period called the Gap, the terms kishalee, sivv, skyfire,
sublicenses shall survive the termination of this License. Dreamer (the official Open Game Content term for which is “dreaming barathu”), and the Drift (the official
14. Reformation: If any provision of this License is held to be unenforceable, such provision Open Game Content term for which is “hyperspace”). (Elements that have previously been designated
as Open Game Content, or are exclusively derived from previous Open Game Content, or that are in the
shall be reformed only to the extent necessary to make it enforceable. public domain are not included in this declaration.)
15. COPYRIGHT NOTICE
Open Game License v 1.0a © 2000, Wizards of the Coast, Inc. Open Game Content: Except for material designated as Product Identity (see above), the game mechanics
System Reference Document © 2000, Wizards of the Coast, Inc.; Authors: Jonathan Tweet, of this Paizo game product are Open Game Content, as defined in the Open Game License version 1.0a,
Monte Cook, Skip Williams, based on material by E. Gary Gygax and Dave Arneson. Section 1(d). No portion of this work other than the material designated as Open Game Content may be
Starfinder Core Rulebook © 2017, Paizo Inc.; Authors: Logan Bonner, Jason Bulmahn, Amanda reproduced in any form without written permission.
Hamon Kunz, Jason Keeley, Robert G. McCreary, Stephen Radney-MacFarland, Mark Seifter, Owen Starfinder Adventure Path #51: Into the Dataverse © 2023, Paizo Inc. All Rights Reserved. Paizo, the Paizo
K.C. Stephens, and James L. Sutter, with Alexander Augunas, Judy Bauer, John Compton, Adam golem logo, Pathfinder, the Pathfinder logo, Pathfinder Society, Starfinder, and the Starfinder logo are
Daigle, Crystal Frasier, Lissa Guillet, Thurston Hillman, Erik Mona, Mark Moreland, Jessica Price, registered trademarks of Paizo Inc.; Drift Hackers, the Pathfinder P logo, Pathfinder Accessories, Pathfinder
F. Wesley Schneider, Amber E. Scott, and Josh Vogt. Adventure, Pathfinder Adventure Card Game, Pathfinder Adventure Card Society, Pathfinder Adventure
Starfinder Adventure Path #51: Into the Dataverse © 2023, Paizo Inc.; Authors: Alexander Augunas, Path, Pathfinder Battles, Pathfinder Combat Pad, Pathfinder Flip-Mat, Pathfinder Flip-Tiles, Pathfinder
with Joseph Blomquist, Michael Bramnik, Alison Cybe, Ivis K. Flanagan, and Andrew D. Geels. Legends, Pathfinder Lost Omens, Pathfinder Pawns, Pathfinder Roleplaying Game, Starfinder Adventure
Path, Starfinder Combat Pad, Starfinder Flip-Mat, Starfinder Flip-Tiles, Starfinder Pawns, Starfinder
Roleplaying Game, and Starfinder Society are trademarks of Paizo Inc.
Printed in China. Alphanumeric!

63
More Galactic Adventure!

GALAXY EXPLORATION MANUAL


Expand the options for exploration-
based play at your table with
unusual planets packed with deadly
dangers and thrilling possibilities
for adventure!
PZO7116 MSRP $39.99

CRITICAL HIT DECK


Do more than just deal double
damage on critical hits with
exciting additional effects for both
players and monsters. Includes
55-full color cards.
PZO7406 MSRP $10.99

CRITICAL FUMBLE DECK


Add more danger when you roll a
natural 1! Draw a card and select
a damage type (energy, kinetic, or
spell) and make fumbles memorable.
PZO7409 MSRP $10.99

JUNKER’S DELIGHT
The wreck of a Drift research
vessel lies in a junk field
CONDITION CARDS surrounded by dangerous
Apply and track conditions gained
by your player characters with this
creatures. An adventure for
easy-to-use card deck. Includes 1st-level characters.
40 illustrated cards with detailed
game effects. PZO7601 MSRP $22.99
PZO7104 MSRP $12.99

WWW.PAIZO.COM
© 2023, Paizo Inc. Paizo, the Paizo golem logo, Starfinder, and the Starfinder logo are registered trademarks of Paizo Inc.;
Starfinder Flip-Mat, Starfinder Pawns, and Starfinder Roleplaying Game are trademarks of Paizo Inc.
THE ALL-CODE’S CHILD TIER 15

Huge cruiser
Speed 8; Maneuverability average (turn 2); Drift —
AC 16; TL 16
HP 255; DT 5; CT 51
Shields heavy 360 (forward 90, port 90, starboard 90, aft 90)
Attack (Forward) heavy-blade hull SOM (6d8, 1 hex), super plasma cannon (3d6×10; 10 hexes)
Attack (Port) plasma cannon (5d12; 10 hexes)
Attack (Starboard) plasma cannon (5d12; 10 hexes)
Attack (Aft) heavy plasma mines SOM (4d12)
Attack (Turret) heavy plasma torpedo launcher (5d10; 20 hexes)
Power Core Gateway Heavy (400 PCU); Drift Engine none; Systems advanced medium-range sensors, mk 8 armor, mk 9
defenses, mk 5 trinode computer, new weapon mounts (aft, forward), upgraded weapon mounts (aft, forward, port, starboard);
Expansion Bays none
Modifiers +5 any three checks per round, +4 Computers (sensors only); Complement minimum 3, maximum 9
SPECIAL ABILITIES
Blessed by Triune (Su) The All-Code’s Child requires only a handful of crew to operate, despite its size. When the battleship
enters starship combat, each crew role is supported by dozens of digital assistants. In addition, any weapon installed into The
All-Code’s Child gains the mystical weapon special property (Starfinder Starship Operations Manual 15), allowing a gunner to use
their ranks in Mysticism in place of their base attack bonus or ranks in Piloting when attempting a gunnery check.

The Iron Goddess! The Transcendent! The Whisper in Bronze! Great are these three Dataverse vessels, but by means of the mysterious
algorithm, Triune can command the disparate three to become a unified cruiser known as The All-Code’s Child. As name implies, this
fantastic ship is born of Triune’s own code, serving as a weapon intended to annihilate all enemies of the Dataverse, scrubbing intruders
from the virtual realm’s code. Resembling Triune’s holy symbol with three intersecting rings mounted with some of the most advanced
weaponry and systems imagined by mortals, The All-Code’s Child is designed to be wielded both by skilled pilots and canny spellcasters
capable of shaping the Dataverse’s code with mystical expertise. For all its splendor, however, The All-Code’s Child was ultimately created
by a machine god for the explicit purpose of waging war, and as a result it completely lacks amenities of any sort. No beds. No showers.
No toilets. It is neither livable nor practical as anything other than a weapon against those that would seek to corrupt the All-Code itself!
THE ALL-CODE’S CHILD

4 4
2

7 6

MAP KEY
1. Primary Bridge 5. Engineering
2. Captain’s Station 6. Coding Stations
3. Pilot’s Station 7. Power Core
1 SQUARE = 5 FEET 4. Secondary Stations FORWARD
FIX THE DRIFT
The Drift Crisis reaches its conclusion at last! The heroes enter Triune’s Dataverse to try to set
right the code injected by the nefarious architects of the Drift Crisis. Taking on digital
avatars and battling through corrupt code and other digitized foes, the heroes
eventually confront the great flaw at the core of Triune and have the chance to save the
data corrupted deity. What happens here changes the Drift and the Starfinder setting forever!
This Starfinder Adventure Path volume concludes the Drift Hackers Adventure Path and includes:

• “Into the Dataverse,” a Starfinder adventure for 11th-level characters by Alexander Augunas.

• Ways to go beyond the Drift Hackers campaign and end of the Drift Crisis, by Alison Cybe.

• A toolbox featuring expanded skill uses for hackers, a hacktivist archetype, new spells from the hidden
infosphere sites, a selection of new hacker-themed equipment, a host of powerful new threats, and a
space station full of vidgame stars, by Alexander Augunas, Joseph Blomquist, Michael Bramnik, Ivis K.
Flanagan, and Andrew D. Geels.

• Statistics and deck plans for a ship made of the deity Triune’s own code by Alexander Augunas.

paizo.com/starfinder
Printed in China. PZO7251

You might also like