Commands
Commands are the 27 player actions available in Terminal Descent, spanning navigation, combat, hacking, trading, and social interaction. Every action in the game is performed by typing a command at the terminal prompt.
Command Reference
> LOOK
| |
|---|---|
| SYNTAX | look
|
| ALIASES | l |
| CATEGORY | style="padding: 4px 12px; color:
|
| Examine your current location. Displays the room description, visible exits, NPCs present, and any obvious items or features. | |
| Always LOOK when entering a new node. Details change based on game state. | |
> MOVE
| |
|---|---|
| SYNTAX | move [direction/node]
|
| ALIASES | go, walk |
| CATEGORY | style="padding: 4px 12px; color:
|
| Navigate to an adjacent node. Specify a direction or connected node name. | |
| EXAMPLES | move north / go echo_ruins
|
| Some connections are one-way or require key items. Use SCAN to see available connections. | |
> SCAN
| |
|---|---|
| SYNTAX | scan
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Area scan showing all connections from the current node, including security levels and known threats. | |
| Information quality improves with Analysis skill level. | |
> SEARCH
| |
|---|---|
| SYNTAX | search
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Thoroughly explore the current room for hidden items, data caches, and secret passages. | |
| May reveal hidden nodes, items, and environmental details not visible with LOOK. | |
> EXAMINE
| |
|---|---|
| SYNTAX | examine [target]
|
| ALIASES | x, inspect |
| CATEGORY | style="padding: 4px 12px; color:
|
| Inspect a specific object, NPC, item, or feature in detail. | |
| EXAMPLES | examine terminal / x fence
|
| Examining objects often reveals lore, hints, and interactive elements. | |
> LISTEN
| |
|---|---|
| SYNTAX | listen
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Listen to ambient sounds and data traffic in the current node. | |
| Can reveal hidden IC, distant events, and environmental storytelling. | |
Combat
> ATTACK
| |
|---|---|
| SYNTAX | attack [target]
|
| ALIASES | a, fight, hit |
| CATEGORY | style="padding: 4px 12px; color:
|
| Execute an offensive action using your loaded attack program against the specified target. | |
| EXAMPLES | attack sentry
|
| Generates HEAT. Damage based on program + Combat skill. Part of multiple protocol chains. | |
> DEFEND
| |
|---|---|
| SYNTAX | defend
|
| ALIASES | d, block |
| CATEGORY | style="padding: 4px 12px; color:
|
| Take a defensive stance, reducing incoming damage this turn based on your defense rating. | |
| First step in Mirror Protocol (DEFEND → COUNTER → ATTACK). | |
> EVADE
| |
|---|---|
| SYNTAX | evade
|
| ALIASES | dodge |
| CATEGORY | style="padding: 4px 12px; color:
|
| Attempt to dodge all incoming attacks this turn. Success rate based on speed and Stealth skill. | |
| First step in Breach Protocol (EVADE → ATTACK) and Ghost Protocol (EVADE → CLOAK → ATTACK). | |
> COUNTER
| |
|---|---|
| SYNTAX | counter
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Prepare a riposte. If hit this turn, reflect a portion of the damage back at the attacker. | |
| Must be hit to trigger. Part of Mirror Protocol and Siege Protocol. | |
> CLOAK
| |
|---|---|
| SYNTAX | cloak
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Activate stealth, becoming invisible to IC for several turns. Duration based on Stealth skill (2-6 turns). | |
| Breaks on attack action. Part of Ghost Protocol (EVADE → CLOAK → ATTACK). Prevents HEAT gain while active. | |
> SPOOF
| |
|---|---|
| SYNTAX | spoof [identity]
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Fake credentials or identity to confuse IC. Can cause IC to ignore you or misidentify you as authorized. | |
| EXAMPLES | spoof admin
|
| Success based on Intrusion/Social skill. Reduces HEAT on success (-5 to -10). | |
Hacking
> ANALYZE
| |
|---|---|
| SYNTAX | analyze [target]
|
| ALIASES | scan |
| CATEGORY | style="padding: 4px 12px; color:
|
| Scan and identify a system, IC program, or data structure. Reveals stats, weaknesses, and hidden properties. | |
| EXAMPLES | analyze hunter
|
| Information detail scales with Analysis skill. First step in Mercy Protocol and Fossil Protocol. | |
> PROBE
| |
|---|---|
| SYNTAX | probe [target]
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Quick reconnaissance of a target. Faster than ANALYZE but reveals less detail. | |
| Useful for rapid assessment in combat. Analysis skill 3+ reveals additional info. | |
> DECRYPT
| |
|---|---|
| SYNTAX | decrypt [target]
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Attempt to crack an encrypted file, terminal, or data structure. | |
| EXAMPLES | decrypt classified_file
|
| Success based on Crypto skill. Failed attempts may trigger alarms (+HEAT). | |
> SNIFF
| |
|---|---|
| SYNTAX | sniff
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Intercept data traffic flowing through the current node. Can reveal passwords, communications, and hidden data streams. | |
| Effectiveness scales with Crypto skill. Passive — does not generate HEAT. | |
> DOWNLOAD
| |
|---|---|
| SYNTAX | download [target]
|
| ALIASES | dl |
| CATEGORY | style="padding: 4px 12px; color:
|
| Extract files from a datastore or terminal. Downloaded data is converted to DATA (¤) currency. | |
| EXAMPLES | download paydata
|
| Value based on paydata classification. Primary income source. | |
> COMBINE
| |
|---|---|
| SYNTAX | combine [item1] [item2]
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Merge two compatible items or programs. Used for crafting, kill-switch assembly, and program upgrades. | |
| EXAMPLES | combine kill_switch_half_1 kill_switch_half_2
|
| Not all items are combinable. Some combinations are puzzle solutions. | |
Social
> TALK
| |
|---|---|
| SYNTAX | talk [npc]
|
| ALIASES | speak |
| CATEGORY | style="padding: 4px 12px; color:
|
| Start a conversation with an NPC. Opens the dialogue interface with available topics. | |
| EXAMPLES | talk fence
|
| Available topics depend on game state, relationship tier, and player knowledge. | |
> ASK
| |
|---|---|
| SYNTAX | ask [npc] about [topic]
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Ask an NPC about a specific topic. Topics unlock based on player discoveries and conversation history. | |
| EXAMPLES | ask fence about programs / ask conduit about lyra
|
| NPCs remember previous conversations. New topics unlock as the player discovers information. | |
Connection
> JACK IN
| |
|---|---|
| SYNTAX | jack in
|
| ALIASES | connect |
| CATEGORY | style="padding: 4px 12px; color:
|
| Connect to a network or subsystem within the current node. | |
| Used to enter deeper layers, corporate networks, and rift portals. | |
> JACK OUT
| |
|---|---|
| SYNTAX | jack out
|
| ALIASES | disconnect |
| CATEGORY | style="padding: 4px 12px; color:
|
| Disconnect from the current network. Dangerous at high HEAT — the Hive may trace your exit point. | |
| At Meltdown HEAT, jacking out causes neural feedback damage. | |
System
> STATUS
| |
|---|---|
| SYNTAX | status
|
| ALIASES | stats, deck |
| CATEGORY | style="padding: 4px 12px; color:
|
| Display the full telemetry dashboard: Cyberdeck stats, skill levels, HEAT, loaded programs, and current objectives.
| |
> HELP
| |
|---|---|
| SYNTAX | help [command]
|
| ALIASES | ? |
| CATEGORY | style="padding: 4px 12px; color:
|
| Display the command reference. Optionally specify a command for detailed usage information. | |
| EXAMPLES | help / help attack
|
> SAVE
| |
|---|---|
| SYNTAX | save [slot_name]
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Save the current game state to a named slot with integrity verification. | |
| EXAMPLES | save before_boss
|
| Multiple save slots supported. Saves include full game state. | |
> LOAD
| |
|---|---|
| SYNTAX | load [slot_name]
|
| ALIASES | restore |
| CATEGORY | style="padding: 4px 12px; color:
|
| Load a previously saved game state. | |
| EXAMPLES | load before_boss
|
| Integrity verification ensures save has not been corrupted. | |
> WAIT
| |
|---|---|
| SYNTAX | wait
|
| CATEGORY | style="padding: 4px 12px; color:
|
| Spend a turn doing nothing. Useful for observing IC patrol patterns, reducing HEAT in safe areas, and timing-based puzzles. | |
| In safe nodes, WAIT reduces HEAT by 1 per turn. Part of Mercy Protocol (ANALYZE → REASON → WAIT). | |
Secret Commands
⚠ SPOILER: Hidden Commands [show/hide]
These commands are not listed in the HELP menu and must be discovered through exploration, NPC hints, or experimentation:
- DIVE — Used at Backbone (Node 13) to access Deep Pool (H5). Requires GHOST_PACKET program loaded.
- TRUST MIRROR — Used at Memory Palace (Node 15) after identifying 3+ deceptions to access Mirror's Nursery (H6).
- XYZZY — Classic adventure game easter egg. Used at Credits screen after completing one ending to access Developer Room (H7).
- KNOCK — Knocking on certain doors reveals hidden responses
- WHISTLE — Attracts attention in certain nodes
- PRAY — Environmental response in specific locations
- PET — Can be used on certain NPCs for unique reactions
- DANCE — Easter egg with environmental responses
- SING — Environmental response, sometimes attracts IC
- FLIP COIN — Random outcome used in some puzzle solutions
- LOOK BEHIND — Check behind objects for hidden items
- TAUNT — In combat, guarantees next ATTACK is a critical hit
- REASON — Attempt to communicate with IC (part of Mercy Protocol)
- LOOK AWAY — Used in specific Mirror deception sequences