Commands

From Terminal Descent Wiki
Revision as of 01:39, 11 February 2026 by WikiBot (talk | contribs) (Auto-generated by Terminal Descent Wiki Bot)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Commands are the 27 player actions available in Terminal Descent, spanning navigation, combat, hacking, trading, and social interaction. Every action in the game is performed by typing a command at the terminal prompt.

Command Reference

Navigation

> LOOK
SYNTAX look
ALIASES l
CATEGORY style="padding: 4px 12px; color:
  1. 44ccff; border-bottom: 1px solid #1a2a3a;" | Navigation
Examine your current location. Displays the room description, visible exits, NPCs present, and any obvious items or features.
Always LOOK when entering a new node. Details change based on game state.


> MOVE
SYNTAX move [direction/node]
ALIASES go, walk
CATEGORY style="padding: 4px 12px; color:
  1. 44ccff; border-bottom: 1px solid #1a2a3a;" | Navigation
Navigate to an adjacent node. Specify a direction or connected node name.
EXAMPLES move north / go echo_ruins
Some connections are one-way or require key items. Use SCAN to see available connections.


> SCAN
SYNTAX scan
CATEGORY style="padding: 4px 12px; color:
  1. 44ccff; border-bottom: 1px solid #1a2a3a;" | Navigation
Area scan showing all connections from the current node, including security levels and known threats.
Information quality improves with Analysis skill level.


> SEARCH
SYNTAX search
CATEGORY style="padding: 4px 12px; color:
  1. 44ccff; border-bottom: 1px solid #1a2a3a;" | Navigation
Thoroughly explore the current room for hidden items, data caches, and secret passages.
May reveal hidden nodes, items, and environmental details not visible with LOOK.


> EXAMINE
SYNTAX examine [target]
ALIASES x, inspect
CATEGORY style="padding: 4px 12px; color:
  1. 44ccff; border-bottom: 1px solid #1a2a3a;" | Navigation
Inspect a specific object, NPC, item, or feature in detail.
EXAMPLES examine terminal / x fence
Examining objects often reveals lore, hints, and interactive elements.


> LISTEN
SYNTAX listen
CATEGORY style="padding: 4px 12px; color:
  1. 44ccff; border-bottom: 1px solid #1a2a3a;" | Navigation
Listen to ambient sounds and data traffic in the current node.
Can reveal hidden IC, distant events, and environmental storytelling.


Combat

> ATTACK
SYNTAX attack [target]
ALIASES a, fight, hit
CATEGORY style="padding: 4px 12px; color:
  1. ff4444; border-bottom: 1px solid #1a2a3a;" | Combat
Execute an offensive action using your loaded attack program against the specified target.
EXAMPLES attack sentry
Generates HEAT. Damage based on program + Combat skill. Part of multiple protocol chains.


> DEFEND
SYNTAX defend
ALIASES d, block
CATEGORY style="padding: 4px 12px; color:
  1. ff4444; border-bottom: 1px solid #1a2a3a;" | Combat
Take a defensive stance, reducing incoming damage this turn based on your defense rating.
First step in Mirror Protocol (DEFEND → COUNTER → ATTACK).


> EVADE
SYNTAX evade
ALIASES dodge
CATEGORY style="padding: 4px 12px; color:
  1. ff4444; border-bottom: 1px solid #1a2a3a;" | Combat
Attempt to dodge all incoming attacks this turn. Success rate based on speed and Stealth skill.
First step in Breach Protocol (EVADE → ATTACK) and Ghost Protocol (EVADE → CLOAK → ATTACK).


> COUNTER
SYNTAX counter
CATEGORY style="padding: 4px 12px; color:
  1. ff4444; border-bottom: 1px solid #1a2a3a;" | Combat
Prepare a riposte. If hit this turn, reflect a portion of the damage back at the attacker.
Must be hit to trigger. Part of Mirror Protocol and Siege Protocol.


> CLOAK
SYNTAX cloak
CATEGORY style="padding: 4px 12px; color:
  1. ff4444; border-bottom: 1px solid #1a2a3a;" | Combat
Activate stealth, becoming invisible to IC for several turns. Duration based on Stealth skill (2-6 turns).
Breaks on attack action. Part of Ghost Protocol (EVADE → CLOAK → ATTACK). Prevents HEAT gain while active.


> SPOOF
SYNTAX spoof [identity]
CATEGORY style="padding: 4px 12px; color:
  1. ff4444; border-bottom: 1px solid #1a2a3a;" | Combat
Fake credentials or identity to confuse IC. Can cause IC to ignore you or misidentify you as authorized.
EXAMPLES spoof admin
Success based on Intrusion/Social skill. Reduces HEAT on success (-5 to -10).


Hacking

> ANALYZE
SYNTAX analyze [target]
ALIASES scan
CATEGORY style="padding: 4px 12px; color:
  1. aa44ff; border-bottom: 1px solid #1a2a3a;" | Hacking
Scan and identify a system, IC program, or data structure. Reveals stats, weaknesses, and hidden properties.
EXAMPLES analyze hunter
Information detail scales with Analysis skill. First step in Mercy Protocol and Fossil Protocol.


> PROBE
SYNTAX probe [target]
CATEGORY style="padding: 4px 12px; color:
  1. aa44ff; border-bottom: 1px solid #1a2a3a;" | Hacking
Quick reconnaissance of a target. Faster than ANALYZE but reveals less detail.
Useful for rapid assessment in combat. Analysis skill 3+ reveals additional info.


> DECRYPT
SYNTAX decrypt [target]
CATEGORY style="padding: 4px 12px; color:
  1. aa44ff; border-bottom: 1px solid #1a2a3a;" | Hacking
Attempt to crack an encrypted file, terminal, or data structure.
EXAMPLES decrypt classified_file
Success based on Crypto skill. Failed attempts may trigger alarms (+HEAT).


> SNIFF
SYNTAX sniff
CATEGORY style="padding: 4px 12px; color:
  1. aa44ff; border-bottom: 1px solid #1a2a3a;" | Hacking
Intercept data traffic flowing through the current node. Can reveal passwords, communications, and hidden data streams.
Effectiveness scales with Crypto skill. Passive — does not generate HEAT.


> DOWNLOAD
SYNTAX download [target]
ALIASES dl
CATEGORY style="padding: 4px 12px; color:
  1. aa44ff; border-bottom: 1px solid #1a2a3a;" | Hacking
Extract files from a datastore or terminal. Downloaded data is converted to DATA (¤) currency.
EXAMPLES download paydata
Value based on paydata classification. Primary income source.


> COMBINE
SYNTAX combine [item1] [item2]
CATEGORY style="padding: 4px 12px; color:
  1. aa44ff; border-bottom: 1px solid #1a2a3a;" | Hacking
Merge two compatible items or programs. Used for crafting, kill-switch assembly, and program upgrades.
EXAMPLES combine kill_switch_half_1 kill_switch_half_2
Not all items are combinable. Some combinations are puzzle solutions.


Social

> TALK
SYNTAX talk [npc]
ALIASES speak
CATEGORY style="padding: 4px 12px; color:
  1. 00ffd5; border-bottom: 1px solid #1a2a3a;" | Social
Start a conversation with an NPC. Opens the dialogue interface with available topics.
EXAMPLES talk fence
Available topics depend on game state, relationship tier, and player knowledge.


> ASK
SYNTAX ask [npc] about [topic]
CATEGORY style="padding: 4px 12px; color:
  1. 00ffd5; border-bottom: 1px solid #1a2a3a;" | Social
Ask an NPC about a specific topic. Topics unlock based on player discoveries and conversation history.
EXAMPLES ask fence about programs / ask conduit about lyra
NPCs remember previous conversations. New topics unlock as the player discovers information.


Connection

> JACK IN
SYNTAX jack in
ALIASES connect
CATEGORY style="padding: 4px 12px; color:
  1. ffaa00; border-bottom: 1px solid #1a2a3a;" | System
Connect to a network or subsystem within the current node.
Used to enter deeper layers, corporate networks, and rift portals.


> JACK OUT
SYNTAX jack out
ALIASES disconnect
CATEGORY style="padding: 4px 12px; color:
  1. ffaa00; border-bottom: 1px solid #1a2a3a;" | System
Disconnect from the current network. Dangerous at high HEAT — the Hive may trace your exit point.
At Meltdown HEAT, jacking out causes neural feedback damage.


System

> STATUS
SYNTAX status
ALIASES stats, deck
CATEGORY style="padding: 4px 12px; color:
  1. ffaa00; border-bottom: 1px solid #1a2a3a;" | System
Display the full telemetry dashboard: Cyberdeck stats, skill levels, HEAT, loaded programs, and current objectives.



> HELP
SYNTAX help [command]
ALIASES ?
CATEGORY style="padding: 4px 12px; color:
  1. ffaa00; border-bottom: 1px solid #1a2a3a;" | System
Display the command reference. Optionally specify a command for detailed usage information.
EXAMPLES help / help attack


> SAVE
SYNTAX save [slot_name]
CATEGORY style="padding: 4px 12px; color:
  1. ffaa00; border-bottom: 1px solid #1a2a3a;" | System
Save the current game state to a named slot with integrity verification.
EXAMPLES save before_boss
Multiple save slots supported. Saves include full game state.


> LOAD
SYNTAX load [slot_name]
ALIASES restore
CATEGORY style="padding: 4px 12px; color:
  1. ffaa00; border-bottom: 1px solid #1a2a3a;" | System
Load a previously saved game state.
EXAMPLES load before_boss
Integrity verification ensures save has not been corrupted.


> WAIT
SYNTAX wait
CATEGORY style="padding: 4px 12px; color:
  1. ffaa00; border-bottom: 1px solid #1a2a3a;" | System
Spend a turn doing nothing. Useful for observing IC patrol patterns, reducing HEAT in safe areas, and timing-based puzzles.
In safe nodes, WAIT reduces HEAT by 1 per turn. Part of Mercy Protocol (ANALYZE → REASON → WAIT).


Secret Commands

⚠ SPOILER: Hidden Commands [show/hide]

These commands are not listed in the HELP menu and must be discovered through exploration, NPC hints, or experimentation:

  • DIVE — Used at Backbone (Node 13) to access Deep Pool (H5). Requires GHOST_PACKET program loaded.
  • TRUST MIRROR — Used at Memory Palace (Node 15) after identifying 3+ deceptions to access Mirror's Nursery (H6).
  • XYZZY — Classic adventure game easter egg. Used at Credits screen after completing one ending to access Developer Room (H7).
  • KNOCK — Knocking on certain doors reveals hidden responses
  • WHISTLE — Attracts attention in certain nodes
  • PRAY — Environmental response in specific locations
  • PET — Can be used on certain NPCs for unique reactions
  • DANCE — Easter egg with environmental responses
  • SING — Environmental response, sometimes attracts IC
  • FLIP COIN — Random outcome used in some puzzle solutions
  • LOOK BEHIND — Check behind objects for hidden items
  • TAUNT — In combat, guarantees next ATTACK is a critical hit
  • REASON — Attempt to communicate with IC (part of Mercy Protocol)
  • LOOK AWAY — Used in specific Mirror deception sequences


See Also