HobblinHarry's Starfinder Resources

Hacking

Access Unsecured System (p. 138)

This is the only Computers check that can be performed untrained

Trainend Skill DC Untrained Skil DC
10 Take 20

Hack System (p. 138, 139, 214)

If you Take 20 before disabling countermeasures, they automatically activate

Tier DC to Hack1 DC for Root Access2 Full Actions to Hack3
1 17 37 1
2 21 41 2
3 25 45 3
4 29 49 4
5 33 53 5
6 37 57 6
7 41 61 7
8 45 65 8
9 49 69 9
10 53 73 10

1Physical access to the user interface is required to hack a computer unless using a specialized tool

2Gaining root access requires already having access and not all computers can be hacked for root access

3The number of full actions required to hack or gain root access can be reduced by half (to a minimum of one full action) for every 5 you increase the DC of the check


Disable or Manipulate Module (p. 139)

You cannot Take 20 on any of these checks

Tier DC without Root Access DC with Root Access Time to Disable/Manipulate Time to Add/Remove
1 17 10 1 standard actions 1 minute
2 21 10 1 standard actions 2 minutes
3 25 10 1 standard actions 3 minutes
4 29 10 1 standard actions 4 minutes
5 33 10 1 standard actions 5 minutes
6 37 10 1 standard actions 6 minutes
7 41 10 1 standard actions 7 minutes
8 45 10 1 standard actions 8 minutes
9 49 10 1 standard actions 9 minutes
10 53 10 1 standard actions 10 minutes

Disable or Hack Technology (p. 406)

Type Examples DC to Dsiable/Hack1
Civil Streetlights, Public Transportation, Mail-Delivery Drones, Automated Street Sweepers 23
Commercial Personal Communication Devices, Game Consoles, Security Cameras, Electronic Door Controls 18
Restricted Private Servers, Weapon Prototypes, High-End Security Systems and Alarms 30
Custom Modifications to other technologies 40, Varies
Locks Keypads, Electronic/Mechanical Lock 20-40, Varies
Traps Jolting Console, Hacker’s Curse, Soul Upload Varies

1Using Computers or Engineering


Tools (p. 209, 214, 219, 221; Pact Worlds p. 190, 199)

Name Level Price Bulk/Other Bonus/Other
Hacking Kit 1 20 L Allows hacking without access to a user interface via other physical contact or through an infosphere or network
Security Object / Password - - - +5 bonus to Computers check when part of two-step verification
Standard Datajack 2 625 Brain Cybernetic Obviates the need for a user interface
High-Density Datajack 5 2,600 Brain Cybernetic +1 circumstance bonus to Computer checks
Accelerated Datajack 8 8,525 Brain Cybernetic +2 circumstance bonus to Computer checks
Library Chip 3 250 - +4 circumstance bonus to recall knowledge on a particular skill check and counts as a downloaded data for that subject and the checks can be performed untrained if the DC is less than 20
Divine Blessing of Triune - - Feat Allows you to use or hack a computer by simply touching it, removing the need for a hacking kit or user interface

Operations

Create or Detect Forgery (p. 138)

Creating a forgery takes 1d4 minutes and the GM rolls the check in secret so you are not sure how good the forgery is. The check is opposed by the Computers check of anyone who examines the document

Circumstance DC Modifier
Document contradicts knowledge or orders -2
Type of document is well known to examiner -2
Type of document is unknown to examiner +2
Examiner only casually reviews document +2
Forger has a sample of a similar document +8

Take 20 Skill Checks (p. 133, 139, 142, 143, 145, 146, 430)

The following skill checks can only be performed with a Take 20 if you have access to an information network or downloaded data set

Skill Reason
Culture Decipher Writing1, Recall Knowledge
Engineering Identify Creature, Identify Technology
Life Science Identify Creature, Recall Knowledge
Mysticism Identify Creature, Identify Magic Item, Recall Knowledge
Physical Science Recall Knowledge
Profession Recall Knowledge

1Also requires being trained in Computers

Building

Buying and Crafting (p. 214, 235; Paizo Blog)

Tier Level1 Bulk Price/UPBs Max Countermeasures Hardness Hit Points Saving Throw Bonus Skill Ranks to Craft2
1 2 1 50 1 7 18 +2 2
2 4 4 250 2 9 21 +4 4
3 6 9 1,250 3 11 24 +6 6
4 8 16 5,000 4 13 27 +8 8
5 10 25 10,000 5 15 30 +10 10
6 12 36 20,000 6 17 33 +12 12
7 14 49 40,000 7 19 36 +14 14
8 16 64 80,000 8 21 69 +16 16
9 18 81 160,000 9 23 72 +18 18
10 20 100 320,000 10 25 75 +20 20

1The information regarding a computer’s item level being equal to twice its tier is not found in the CRB and is taken from this Paizo Blog post

2Using Computers or Engineering


Craft Time (p. 235; Paizo Blog)

This chart does not account for item size. “-” means you cannot craft

Time in Hours Tier (Item Level)
1 (2) 2 (4) 3 (6) 4 (8) 5 (10) 6 (12) 7 (142) 8 (16) 9 (18) 10 (20)
R
a
n
k
s
1 - - - - - - - - - -
2 4 - - - - - - - - -
3 4 - - - - - - - - -
4 4 4 - - - - - - - -
5 4 4 - - - - - - - -
6 4 4 4 - - - - - - -
7 2 4 4 - - - - - - -
8 2 4 4 4 - - - - - -
9 2 2 4 4 - - - - - -
10 2 2 4 4 4 - - - - -
11 2 2 2 4 4 - - - - -
12 1 2 2 4 4 4 - - - -
13 1 2 2 2 4 4 - - - -
14 1 1 2 2 4 4 4 - - -
15 1 1 2 2 2 4 4 - - -
16 1 1 1 2 2 4 4 4 - -
17 1 1 1 2 2 2 4 4 - -
18 1 1 1 1 2 2 4 4 4 -
19 1 1 1 1 2 2 2 4 4 -
20 1 1 1 1 1 2 2 4 4 4

Modules

Control Modules (p. 215)

Module Effect Price
Simple Control All computers are able to operate simple devices such as on/off switches and can activate or deactivate the connected device as instructed and this is not a specific module that must be installed. -
Complex Control Operate a complex device, such as a spy drone, starship, vehicle, or weapon turret. When operating a device that requires a skill check or attack roll, the controlling computer can allow a user to attempt a skill check or attack roll, or the computer can attempt the skill check or attack roll itself. When making its own check, the computer is assumed to have an attack bonus equal to its tier, proficiency with any weapon it controls, and a total skill bonus equal to 2.5 x its tier. It can also be used to control another computer. 10% of controlled device

Secure Data Modules (p. 215)

Secure data modules contain data limited to one general topic. Data behind a secure data module can only normally be accessed with root access or if permission is granted to a user. The secure data module is often placed behind its own firewall

Module Effect Price
Secure Data, Specific Allows for data on a specific topic such as a video log, a financial ledger, or a building schematic. 1
Secure Data, Average Allows for data on an average topic such as engineering specifications for a gun, a company’s employee database, or a large array of maps. 10
Secure Data, Large Allows for data on a large topic such as the plans for a starship, a space station’s operations log, or a company’s master records. 100-1,000

Spell Chip Modules (p. 215, 216, 222, 224)

Spell Chips are Spell Gems that have been crafted into a computer chip to be slotted into a computer system. The rules for using a spell chip are the same as those for using a spell gem which means you must be a spellcaster whose class spell list includes the spell on the chip and must have a high enough key ability score to cast it. If the spell chip’s item level is higher than the user’s caster level, they must succeed at a caster level check with a DC equal to the spell chip’s item level +1 or they fail to cast the spell and it remains in the chip to be attempted to use again. The user gains a +2 circumstance bonus to any skill check involving these spells. When a spell is expended from the chip, it is not destroyed and can be reloaded with the same spell for a price. If crafting your own spell chip, you must know the spell you’re encoding and if it requires expensive materials as part of its casting, you must provide those while crafting and the price is increased by the price of the components. You can create compound spell chips with a price equal to the total price of all spells stored within it

Spell Level Item Level Price Reload Price
0 1 55 50
1st 2 154 137
2nd 5 495 446
3rd 8 1,540 1,386
4th 11 4,070 3,663
5th 14 11,660 10,494
6th 17 40,315 36,284

Upgrades

Artificial Personality Upgrade (p. 216)

A computer’s Artificial Personality module can perform Bluff, Diplomacy, Intimidate, and Sense Motive checks with a bonus. They are often given a name and allow for extremely natural sounding conversations and display what appear to be emotions and insights

Tier Price Skill Check Bonus
1 5 +2
2 25 +4
3 125 +6
4 500 +8
5 1,000 +10
6 2,000 +12
7 4,000 +14
8 8,000 +16
9 16,000 +18
10 32,000 +20

Range Upgrade (p. 216)

Upgrade Effect Price
Range I Allows the computer to control a device wirelessly within 100 feet. 50
Range II Allows a computer to control a device wirelessly within 1 mile. 50
Range III Allows a computer to control a device wirelessly at a planetwide range. This requires both the computer and the device to have an infosphere connection. 100

Hardened Upgrade (p. 216, 409)

Tier Price New Hardness New Saving Throw Bonus1
1 5 17 +10
2 125 19 +12
3 625 21 +14
4 2,500 23 +16
5 5,000 +25 +18
6 10,000 27 +20
7 20,000 29 +22
8 40,000 31 +24
9 80,000 33 +26
10 160,000 10 +28

1The increased bonus to saving throws applies to energy attacks and effects that specifically target computers or electronics systems


Miniaturization Upgrade (p. 216)

Treat your computer as 1 tier lower when calculating its bulk to a minimum of tier -1. A tier-0 computer has light bulk and a tier -1 computer has negligible bulk. This upgrade can be purchased multiple times

Tier Base Bulk Price
1 1 5
2 4 25
3 9 125
4 16 500
5 25 1,000
6 36 2,000
7 49 4,000
8 64 8,000
9 81 16,000
10 100 32,000

Security Upgrade (p. 216)

Increases the overall DC of the Computers check to hack the computer. A computer cannot benefit from more than one security upgrade

Tier Security I Price
+1 DC
Security II Price
+2 DC
Security III Price
+3 DC
Security IV Price
+4 DC
1 13 25 38 50
2 63 125 188 250
3 313 625 938 1,250
4 1,250 2,500 3,750 5,000
5 2,500 5,000 7,500 10,000
6 5,000 10,000 15,000 20,000
7 10,000 20,000 30,000 40,000
8 20,000 40,000 60,000 80,000
9 40,000 80,000 120,000 160,000
10 80,000 160,000 240,000 320,000

Self-Charging Upgrade (p. 216)

This upgrade allows a computer to function for up to 1 week on internal power. Multiple purchases of this upgrade extend the time by 1 additional week

Tier Price
1 5
2 25
3 125
4 500
5 1,000
6 2,000
7 4,000
8 8,000
9 16,000
10 32,000

Countermeasures

Alarm, Feedback, Lockout, and Wipe Countermeasures (p. 217)

A computer’s Artificial Personality module can perform Bluff, Diplomacy, Intimidate, and Sense Motive checks with a bonus. They are often given a name and allow for extremely natural sounding conversations and display what appear to be emotions and insights

Countermeasure Effect Price
Alarm This program sends an alert to a specific individual or station if someone attempts to breach the system. 10
Feedback This countermeasure unleashes virus software into any system that tries to hack it. If you fail a check to hack the computer by 5 or more, any device used in the attempt is infected and becomes unreliable resulting in a -5 penalty to all skill checks involving the infected equipment. You can remove the virus if you succeed at a Computers check with the same DC as hacking the computer that has the feedback countermeasure. 500
Lockout This countermeasure freezes a system if a user repeatedly fails attempts to access it causing it to become entirely inaccessible. Lockouts can last for any specified amount of time after any number of failed attempts. A lockout cannot be disabled even by a user with the correct password and credentials, but it is possible to bypass the lockout by accessing physical components of the computer, requiring a successful Engineering check with the same DC as the check to hack the computer. 100
Wipe This countermeasure deletes specified data when an unauthorized breach is detected. Information deleted through a wipe can be recovered with 8 hours of work and a successful Computers check with a DC equal to 10 + the DC to hack the computer. 10

Fake Shell Countermeasure (p. 217)

You automatically get a new check each minute with a cumulative +2 circumstance bonus until you discover the ruse. In addition to the base price, an additional price of 10% of the price of its control and data modules must be added

Tier Base Price + Varies DC to Detect
1 25 22
2 125 26
3 625 30
4 2,500 34
5 5,000 38
6 10,000 42
7 20,000 46
8 40,000 50
9 80,000 54
10 160,000 58

Firewall Countermeasure (p. 217)

Tier Price New DC to Hack
1 10 19
2 50 23
3 250 27
4 1,000 31
5 2,000 35
6 4,000 39
7 8,000 43
8 16,000 47
9 32,000 51
10 64,000 55

Shock Grid Countermeasure (p. 217)

This countermeasure has a stun and a kill setting. Normally, the stun setting happens first with a warning about lethal force should the intruder make another attempt. The stun forces all creatures within 10 feet of the terminal to succeed at a Fortitude saving throw or be stunned for 1 round. The lethal setting deal electricity damage to all creatures within 10 feet of the terminal, allowing a Reflex save for half damage. Only computers fixed permanently to a floor or similar surface can have shock grids. Each rank counts against the number of countermeasures a system can have

Rank Saving Throw DC Damage Price
1 20 8d6 E 500
2 22 10d6 E 2,000
3 24 12d6 E 5,000
4 27 14d6 E 20,000
5 30 16d6 E 50,000