Commit Graph

470 Commits

Author SHA1 Message Date
Z. Cliffe Schreuders
6da63c650d docs: Add simplified 2-table schema (missions + games)
Major simplification to migration plan:
- Remove NpcScript model entirely
- Reduce to 2 tables: missions (metadata) + games (state + scenario snapshot)
- Serve ink files directly from filesystem via game endpoints
- Move scenario_data to game instances (enables per-instance randomization)
- Eliminates Issue #2 (NPC schema complexity)
- Reduces P0 fixes from 10 hours to 2-3 hours
- Much simpler seed process (metadata only)
2025-11-20 15:37:37 +00:00
Z. Cliffe Schreuders
e871d6df84 docs: Add comprehensive review of Rails Engine migration plan
- Identify 5 critical issues requiring fixes before implementation
- Validate architecture decisions (mostly solid)
- Provide corrected database schema for shared NPCs
- Document P0 fixes needed: Ink compilation, file structure, NPC schema
- Recommend 1.5 days of prep work to save 3-5 days of rework
- Total review: 6 documents covering issues, architecture, and solutions
2025-11-20 15:37:37 +00:00
Z. Cliffe Schreuders
50eba12238 docs: Add Hacktivity integration validation and setup guide 2025-11-20 15:37:37 +00:00
Z. Cliffe Schreuders
15fbadecb2 docs: Add complete Rails Engine migration plan (JSON-centric approach)
Comprehensive implementation plan for converting BreakEscape to a Rails Engine.

DOCUMENTATION CREATED:
- 00_OVERVIEW.md: Project aims, philosophy, decisions summary
- 01_ARCHITECTURE.md: Technical design, models, controllers, API
- 02_IMPLEMENTATION_PLAN.md: Phases 1-6 with bash/rails commands
- 02_IMPLEMENTATION_PLAN_PART2.md: Phases 7-12 with client integration
- 03_DATABASE_SCHEMA.md: 3-table JSONB schema reference
- 04_TESTING_GUIDE.md: Fixtures, tests, CI setup
- README.md: Quick start and navigation guide

KEY APPROACH:
- Simplified JSON-centric storage (3 tables vs 10+)
- JSONB for player state (one column, all game data)
- Minimal client changes (move files, add API client)
- Dual mode: Standalone + Hacktivity integration
- Session-based auth with polymorphic player
- Pundit policies for authorization
- ERB templates for scenario randomization

TIMELINE: 12-14 weeks (vs 22 weeks complex approach)

ARCHITECTURE DECISIONS:
- Static assets in public/break_escape/
- Scenarios in app/assets/scenarios/ with ERB
- .ink and .ink.json files organized by scenario
- Lazy-load NPC scripts on encounter
- Server validates unlocks, client runs dialogue
- 6 API endpoints (not 15+)

Each phase includes:
- Specific bash mv commands
- Rails generate and migrate commands
- Code examples with manual edits
- Testing steps
- Git commit points

Ready for implementation.
2025-11-20 15:37:37 +00:00
Z. Cliffe Schreuders
b1356c1157 docs: Add simplified Rails Engine migration approach
RECOMMENDED APPROACH: 12-14 weeks instead of 22 weeks

KEY SIMPLIFICATIONS:
- Use JSON storage for game state (already in that format)
- 3 database tables instead of 10+
  - game_instances (with player_state JSONB)
  - scenarios (with scenario_data JSONB)
  - npc_scripts (Ink JSON)

- 6 API endpoints instead of 15+
  - Bootstrap game
  - Load room (when unlocked)
  - Attempt unlock
  - Update inventory
  - Load NPC script (on encounter)
  - Sync state (periodic)

VALIDATION STRATEGY:
- Validate unlock attempts (server has solutions)
- Validate room/object access (check unlocked state)
- Validate inventory changes (check item in unlocked location)
- NPCs: Load Ink scripts on encounter, run conversations 100% client-side
- NPC door unlocks: Simple check (encountered NPC + scenario permission)

WHAT WE DON'T TRACK:
- Every event (client-side only)
- Every conversation turn (no sync needed)
- Every minigame action (only result matters)
- Complex NPC permissions (simple rule: encountered = trusted)

BENEFITS:
- Faster development (12-14 weeks vs 22 weeks)
- Easier maintenance (JSON matches existing format)
- Better performance (fewer queries, JSONB indexing)
- More flexible (easy to modify game state structure)
- Simpler logic (clear validation rules)

Updated README_UPDATED.md to recommend simplified approach first.
Complex approach documentation retained for reference.
2025-11-20 15:37:37 +00:00
Z. Cliffe Schreuders
9316fb2632 docs: Add comprehensive codebase exploration documentation
Generated by automated codebase analysis.
Provides detailed breakdown of project structure, systems, and components.
Referenced by updated migration plans.
2025-11-20 15:37:37 +00:00
Z. Cliffe Schreuders
1e775ef89c docs: Update Rails Engine migration plans for current codebase
Updated migration plans to reflect significant codebase evolution:

NEW SYSTEMS DOCUMENTED:
- NPC system (fully implemented with NPCManager, conversation state, events)
- Event system (80+ events across codebase)
- Global game state management (window.gameState.globalVariables)
- Multiple scenarios (24 total, up from 1 originally planned)

KEY UPDATES:
- UPDATED_MIGRATION_STATUS.md: Comprehensive status of what's changed
  - What's implemented vs what still needs server-side integration
  - Updated timeline: 22 weeks (was 18 weeks)
  - New database schema requirements
  - Updated risk assessment

- CLIENT_SERVER_SEPARATION_PLAN.md: Added 3 new systems
  - System 5: NPC System (hybrid approach confirmed)
  - System 6: Event System (selective logging)
  - System 7: Global Game State (server as source of truth)
  - Updated migration checklist: 9 phases (was 7)
  - Updated timeline: 18-22 weeks

- README_UPDATED.md: New master index document
  - Quick start guide
  - Document index
  - What's changed summary
  - Timeline breakdown
  - Architecture decisions
  - Success metrics

MIGRATION APPROACH:
- Hybrid NPC approach: Scripts client-side, validation server-side
- Selective event logging: Critical events only
- State sync: Server as source of truth, client cache for performance
- Incremental rollout with dual-mode support

TIMELINE: 22 weeks (~5.5 months)
- Added 4 weeks for NPC, Event, State integration
- Original: 18 weeks → Updated: 22 weeks (+22%)

All plans are complete, self-contained, actionable, and feature-focused.
Ready for team review and implementation.
2025-11-20 15:37:37 +00:00
Z. Cliffe Schreuders
1c391c9d78 feat: Add educational tool help files for security tools
Create comprehensive Ink dialogue files for five security tools:
- Kali Linux: Overview and getting started guide
- nmap: Port scanning and network discovery
- Metasploit: Finding and running exploits
- chmod: File permissions and usage
- nikto: Web vulnerability scanning

Each file provides interactive educational content with:
- Multiple topic branches for different aspects
- Practical examples and use cases
- Step-by-step instructions
- Security and ethical usage reminders
- Navigation between related topics

These files can be included in game scenarios to provide
contextual help to players learning security tools.
2025-11-19 18:26:14 +00:00
Z. Cliffe Schreuders
4c561836ca fix: Clean up all game scenario files
- Remove ready_for_practice and challenge_tips sections
- Update encoding_encryption.ink header and start section
- Clean exploitation.ink and post_exploitation.ink references
- Ensure all files use consistent game narrative format
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
2bf225483c fix: Clean up phishing_social_engineering.ink structure
- Remove all tracking variables except haxolottle_rapport
- Remove challenge_tips, ready_for_simulation, end_session sections
- Add commands_reference section
- Ensure consistent Haxolottle speaker throughout
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
3ccfe9d99a feat: Update remaining game scenario files to Haxolottle dialogue
- exploitation.ink
- post_exploitation.ink
- phishing_social_engineering.ink
- encoding_encryption.ink
- feeling_blu_ctf.ink

All files now use consistent Haxolottle character and conversational tone
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
245a3314fa feat: Update vulnerabilities_exploits.ink for game narrative - convert to Haxolottle dialogue 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
7225babaf0 feat: Update scanning.ink for game narrative - convert to Haxolottle dialogue 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
2cce9e245e feat: Update malware_metasploit.ink for game narrative - convert to Haxolottle dialogue 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
dddabe54fe feat: Update vulnerability_analysis.ink for game narrative - convert to Haxolottle dialogue 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
be497931de feat: Create reusable tool explanations and update intro_linux for game narrative
- Add nmap_basics.ink, metasploit_basics.ink, netcat_basics.ink as reusable tools
- Completely rewrite intro_linux.ink:
  - Remove all unnecessary tracking variables
  - Change from 'Tech Instructor' to 'Haxolottle'
  - Remove lab/training/exercise language
  - Convert to helpful NPC offering to explain concepts
  - Keep all technical content but make conversational
  - Link to reusable tool files where appropriate
  - Use proper ink patterns (hub structure, #exit_conversation)
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
e46d8544a2 feat: Create game scenarios directory with lab sheet copies and dead drop system
- Copy all lab sheets to game_scenarios/ for narrative conversion
- Add dead_drop_system.ink explaining ENTROPY's flag-based communication
- Prepare for converting educational labs into game challenges
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
c4d367020a feat: Add GBL Feeling Blu CTF challenge lab sheet - completes Introducing Attacks category 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
a94a8e4b55 feat: Add GBL vulnerability assessment lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
1a0539d432 feat: Add GBL post-exploitation techniques lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
ab96da0731 feat: Add GBL exploitation techniques lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
531a2499ae feat: Add GBL information gathering and network scanning lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
614f5f9fe9 feat: Add GBL vulnerabilities, exploits, and remote access payloads lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
fbcc23b375 feat: Add GBL malware and Metasploit Framework lab sheet 2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
6d271e1350 feat: Update GBL encoding and encryption lab sheet with corrected ink patterns
Improved version following ink best practices:
- Removed unnecessary tracking variables (ink handles choice visibility automatically)
- Uses hub structure with #exit_conversation
- Simplified dialogue flow
- Only tracks persistent state (instructor_rapport)
- Covers: encoding vs encryption, ASCII, hex, Base64, DES, AES, GPG, OpenSSL
- Commands reference and practical challenge tips included

Game-based learning replacement for traditional lab sheets.
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
433a5d6b1e feat: Add GBL phishing and social engineering lab sheet
Converts cyber_security_landscape/3_phishing.md into interactive dialogue:
- Social Engineering Specialist NPC guides through human factors
- Hub structure covering: human factors, phishing basics, reconnaissance, email spoofing, malicious attachments, reverse shells
- Detailed explanations of macro creation, msfvenom payloads, and netcat
- Strong emphasis on ethical boundaries and authorized testing
- Attack workflow and challenge tips sections
- Progress tracking with ethical awareness flags

Educational content for authorized security testing only.
2025-11-19 18:24:26 +00:00
Z. Cliffe Schreuders
f081cf6712 feat: Add GBL Linux fundamentals lab sheet in ink format
Converts introducing_attacks/1_intro_linux.md into interactive dialogue:
- Tech Instructor NPC guides through Linux basics
- Hub structure for major topics: command-line, vi, piping, redirection, networking, SSH, Hydra
- Each topic has short explanations with deep-dive options
- Commands reference section
- Challenge tips for practical exercises
- Progress tracking and instructor rapport system

Game-based learning replacement for traditional lab sheets.
2025-11-19 18:24:25 +00:00
Z. Cliffe Schreuders
d0e27d69a1 docs: Add gameplay integration guide with Valley Memorial scenario example 2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
dd70afca9f docs: Update README with all 11 cell operations (complete) 2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
f97302fe7f feat: Add final 2 cell LORE fragments (AI Singularity and Crypto Anarchists) 2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
96ceb2ffdd feat: Add Ghost Protocol cell LORE fragment (Privacy Apocalypse data dump) 2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
a499c5ee3f feat: Add Supply Chain Saboteurs and Quantum Cabal LORE fragments
Created comprehensive operational reports for 2 more ENTROPY cells (total: 8 of 11):

7. Supply Chain Saboteurs - TRUSTED BUILD Post-Mortem (CELL_OP_SUPPLY_CHAIN_001):
   - 18-month operation compromising enterprise software build pipeline
   - Backdoor (SUNBEAM.dll) distributed to 12,847 organizations via trusted updates
   - SolarWinds-style supply chain attack demonstration
   - Discovered after 8 months, misattributed to nation-state actor
   - Collateral damage: Developer-14 fired, CloudManage lost $2B, software update trust destroyed
   - Copycat attacks likely (techniques now public)
   - Cell refuses Phase 3: "Supply chain attacks cannot be safely constrained"
   - Trojan Horse's realization: Lost control, broke trust irreversibly

8. Quantum Cabal - Tesseract Experiment Lab Notes (CELL_OP_QUANTUM_CABAL_001):
   - Experiment QC-47 "Dimensional Interface Protocol" (Jan-Feb 2024)
   - Blends legitimate quantum computing with Lovecraftian cosmic horror
   - Real science: Quantum entanglement, QKD, superconducting qubits
   - Anomalous results: Room temperature quantum coherence (violates physics)
   - Non-random measurement patterns, mathematical proofs from unknown source
   - Psychological casualties: Dr. Park (whispers, medical leave), Dr. Sharma (resigned)
   - Dr. Kowalski decoded proof of "quantum consciousness"
   - Dr. Cross (Singularity) insists experiments continue despite trauma
   - Ambiguous conclusion: New physics? Collective delusion? Actual contact?
   - Recommendation: Terminate research, some doors should stay closed

Key Themes:
- Supply Chain: Most successful operation becomes most ethically disastrous
- Supply Chain: Lost control of complex attack, trust erosion irreversible
- Quantum Cabal: Unique tone blending serious science with cosmic horror
- Quantum Cabal: Uncertainty is the horror—unclear what's real
- Both cells show fracturing: Members resign/medical leave, refuse Phase 3
- Pattern continues: ENTROPY operations cause uncontrollable consequences

Educational Value:
- Supply Chain: Software build security, SolarWinds-style attacks, trust models
- Supply Chain: Supply chain attack cascading consequences and replication
- Quantum Cabal: Quantum computing, quantum cryptography (all accurate science)
- Quantum Cabal: Observer bias, frontier research ethics, pseudoscience vs breakthrough
- Both maintain high educational rigor while exploring ethical complexity

Narrative Innovation:
- Supply Chain: Post-mortem format shows reflection after disaster
- Quantum Cabal: Lab notes format, ambiguous "horror" without clear conclusion
- Quantum Cabal: First cell where threat isn't clearly defined (existential uncertainty)
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
8a93e07afc feat: Add 3 more cell-specific LORE fragments (Ransomware Inc, Zero Day, Social Fabric)
Added comprehensive operational reports for 3 additional ENTROPY cells (total: 6 of 11):

4. Ransomware Incorporated - Healthcare Ethics Review (CELL_OP_RANSOMWARE_INC_001):
   - Q3 2024: 8 healthcare ransomware deployments
   - Detailed 3-tier system (Tier 1: NEVER encrypt life-critical systems)
   - Valley Memorial Hospital near-death incident (14-min ICU monitoring gap, patient blood pressure drop)
   - Kill switch activation prevented death (auto-decrypt in 8 minutes)
   - 48-hour auto-decryption prevents permanent damage
   - Cipher King's profound moral crisis ("One death makes us murderers")
   - Measurable impact: Drove $47M security investment across healthcare
   - Phase 3 status: Uncertain participation due to Valley Memorial trauma

5. Zero Day Syndicate - Vulnerability Research Report (CELL_OP_ZERO_DAY_001):
   - Q3 2024: 12 vulnerabilities discovered (7 critical, 5 high severity)
   - Epic EHR disclosed responsibly (protected 250M patient records)
   - SCADA vulnerabilities retained for Phase 3 (enabled Critical Mass)
   - $15M dark web value rejected (ideology over profit)
   - Disclosure dilemma: Protect users vs. demonstrate insecurity
   - Prophet's moral ledger: Epic disclosure protected patients, but SCADA weaponization enabled Valley Memorial
   - 8 zero-days reserved for Phase 3, immediate disclosure after
   - Dead man's switch for auto-disclosure if compromised

6. Social Fabric - Polarization Campaign Analysis (CELL_OP_SOCIAL_FABRIC_001):
   - Operation FRACTURED TRUST (April-Sept 2024)
   - 627 fake personas, 47M impressions, 12 narratives reached mainstream media
   - Measurable harm: Community trust ↓22%, polarization ↑38% in test counties
   - Real victims: 2 candidates harassed off campaigns, communities damaged
   - Psychological toll: 3 member resignations, substance abuse, depression
   - Dissonance's complete ethical collapse: "We've become indistinguishable from the enemy"
   - Cell REFUSES Phase 3 participation (vote: 8-2 against)
   - Leader resigns: "Some problems can't be demonstrated without becoming the problem"

Key Themes Across All 6 Fragments:
- Ethical complexity and genuine moral doubt from all cell leaders
- Safeguards exist but can fail (Valley Memorial proves this)
- Internal dissent and fracturing (2 cells refuse/question Phase 3)
- Measurable real-world impact (both positive reform and negative harm)
- Psychological toll on operators (resignations, moral distress)
- Financial sacrifice for ideology ($15M+ foregone for beliefs)

Updated README:
- Fragment count: 3 → 6 (6 of 11 cells complete)
- Added 3 new cell summaries with player value
- Updated Phase 3 integration (shows cell refusals and doubts)
- Updated recommended reading order (1-6 with progression)
- Revised future additions (5 cells remaining)

Educational Value:
- Ransomware Inc: Healthcare cybersecurity, ethical attack constraints, risk assessment
- Zero Day: Vulnerability disclosure ethics, bug bounty economics, researcher responsibility
- Social Fabric: Information operations, algorithmic manipulation, psychological warfare ethics
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
8f37b949c1 feat: Add cell-specific LORE fragments for Critical Mass, Digital Vanguard, and Insider Threat Initiative
Created detailed operational reports from three key ENTROPY cells:

1. Critical Mass - Grid Reconnaissance (CELL_OP_CRITICAL_MASS_001):
   - 847 SCADA systems compromised with Equilibrium.dll
   - 5 insider assets detailed (Switchboard, Kilowatt, Voltage, Megawatt, Blackbox)
   - Hospital/emergency bypass lists (ethical constraints)
   - Phase 3 readiness at 95%
   - Shows Blackout's moral struggle with potential casualties

2. Digital Vanguard - Paradigm Shift Q3 Report (CELL_OP_DIGITAL_VANGUARD_001):
   - Legitimate consulting front ($847K revenue)
   - 10 operations (8 successful, 2 failed)
   - Intelligence hub for other cells
   - 4 corporate insider assets
   - Shows Morpheus questioning ethics of trust exploitation

3. Insider Threat Initiative - Deep State Operation (CELL_OP_INSIDER_THREAT_001):
   - 47 government placements (DOE, CISA, FBI, NSA, FERC, etc.)
   - 10-year infiltration operation (2018-2028)
   - Detailed recruitment and vetting processes
   - Polygraph countermeasures (ideological true believers)
   - Shows Raven's responsibility for recruited civil servants

Features:
- Cross-cell intelligence sharing patterns
- Phase 3 integration and coordination
- Ethical complexity and moral doubt from cell leaders
- Professional competence and OPSEC discipline
- Educational CyBOK alignment (SCADA security, insider threats, social engineering)
- Gameplay integration notes

All fragments align with universe bible 11-cell structure.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
a8135d3703 fix: Update ENTROPY LORE to align with universe bible 11-cell structure
- Remove inconsistent 5-cell (ALPHA/BETA/GAMMA/DELTA/EPSILON) structure
- Update all organizational LORE to reference 11 established cells:
  * Digital Vanguard, Critical Mass, Quantum Cabal
  * Zero Day Syndicate, Social Fabric, Ghost Protocol
  * Ransomware Incorporated, Supply Chain Saboteurs
  * Insider Threat Initiative, AI Singularity, Crypto Anarchists

Changes:
- STRAT_001: Add postscript explaining evolution from 5 to 11 cells
- TECH_TOOL_001: Update to reference Critical Mass (not DELTA)
- ENTROPY_PERSONNEL_001: Update Cascade to match Critical Mass member Dr. Sarah Winters
- ENTROPY_OPS_001: Update to reference Digital Vanguard and Insider Threat Initiative
- ENTROPY_HISTORY_001: Note early cell evolution to specialized structure
- PROTO_CELL_001: Remove specific cell designation examples
- TRAIN_RECRUIT_001/TRAIN_OPSEC_001: Remove cell-specific references
- README_ORGANIZATIONAL_LORE: Remove OPCOM_001, update all references

Deletions:
- OPCOM_001: Removed Phase 3 coordination doc (inconsistent with universe bible)

This brings all organizational LORE into consistency with established universe bible.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
a75fb6c110 feat: Add ENTROPY organizational LORE fragments revealing internal operations
Created 7 comprehensive internal ENTROPY documents organized into 5 categories, providing deep insight into the organization's structure, methods, philosophy, and operations.

## New Fragment Categories:

### 1. Training Materials (2 fragments)

**TRAIN_RECRUIT_001: Asset Recruitment Fundamentals**
- Complete recruitment methodology manual (3.2, June 2024)
- Four vulnerability categories: Financial (75% success), Ideological (45%), Personal (60%), Career (35%)
- Seven-stage progressive commitment (Week 1: innocent contact → Week 10: full operational)
- Target organization prioritization (Tier 1: Critical infrastructure, Tier 2: Fortune 500, Tier 3: SMB)
- OPSEC protocols for recruiters (cover identity, surveillance detection, compartmentalization)
- Case studies: NIGHTINGALE (success - Sarah Martinez), CARDINAL (failure - security researcher)
- Ethical considerations from The Architect
- **Educational Value:** Social engineering, insider threat vectors, recruitment psychology

**TRAIN_OPSEC_001: Handler Operational Security**
- Golden Rules: You Don't Exist, Trust Is Liability, Assume Surveillance, Compartmentalization Is Sacred
- Handler identity management (codenames, separate devices, digital hygiene)
- Asset communication protocols (Signal for coordination, dead drops for intel, in-person rare)
- Surveillance Detection Routes (SDR) - 60-90min before every meeting
- Payment security (cryptocurrency preferred, cash acceptable, wire transfer avoid)
- Counter-intelligence awareness (detecting flipped assets)
- Capture protocols: "I want a lawyer" (repeat indefinitely)
- Burnout recognition and exit procedures
- **Educational Value:** Covert operations tradecraft, OPSEC principles, countersurveillance

### 2. Operational Communications (1 fragment)

**OPCOM_001: Phase 3 Cell Coordination**
- The Architect's final coordination message (June 28, 2025, T-minus 17 days)
- Recipients: All 5 cell leaders (ALPHA_PRIME through EPSILON_PRIME)
- Cell-specific target assignments:
  - **ALPHA**: Financial systems (banks, stock exchange, cryptocurrency)
  - **BETA**: Healthcare (EHR, medical devices, insurance - life-safety protected)
  - **GAMMA**: Telecommunications (ISP routing, mobile data, DNS)
  - **DELTA**: Energy grid (SCADA, load balancing, brownouts not blackouts)
  - **EPSILON**: Transportation/Logistics (airlines, freight, transit)
- Operational timeline: July 15, 2025, 00:00-14:00 EST (staggered activation)
- Abort criteria: Life safety risk, operational compromise, strategic conditions violated
- Success definition: 40% minimum, 70% target, 100% optimal
- Strategic restraints: Zero casualties, reversible damage, 72-hour window
- **Reveals:** Complete Phase 3 plan, coordination between cells, specific targets

### 3. Cell Protocols (1 fragment)

**PROTO_CELL_001: Cell Structure and Operations**
- Cell hierarchy: Architect → Cell Leaders → Handlers → Technical Specialists → Support Roles
- Typical cell size: 8-15 members (1 leader, 3-5 handlers, 2-3 technical, 2-4 support)
- Cell budget: $500K-$1.5M annually (60% asset payments, 15% equipment, 15% infrastructure, 10% stipends)
- Weekly operational meetings (rotating safe houses, 90min, phones in Faraday bags)
- Burn protocols: Level 1 (individual), Level 2 (cell), Level 3 (network)
- Target selection criteria (centralized systems, avoid small business/life-safety)
- Asset management (recruitment, tasking, payment, termination)
- Inter-cell communication (prohibited except through Architect)
- **Educational Value:** Covert organization structure, compartmentalization, operational security

### 4. Strategic Planning (1 fragment)

**STRAT_001: Ten-Year Vision (2015-2025)**
- Original October 2015 strategic document by The Architect
- Updated January 2023 with postscript for cell leaders
- **Phase 1 (2015-2018)**: Foundation - Build capabilities, recruit founding members
  - Goal: 15-20 members across 3 cells, initial tooling
  - Status: EXCEEDED (5 cells, 60+ members, advanced tools)
- **Phase 2 (2018-2022)**: Expansion - Scale operations, recruit 100+ assets
  - Goal: 5 cells, 100+ assets in critical infrastructure, 20-30 operations
  - Status: ACHIEVED (Equilibrium.dll on 800+ systems, 25 successful operations)
- **Phase 3 (2023-2025)**: Demonstration - Coordinated multi-sector disruption
  - Activation: July 15, 2025
  - Goal: Demonstrate infrastructure fragility at scale
- **Phase 4 (2025-2030)**: Options post-Phase 3 (Dissolve, Continue, Go Public, Pivot to Defense)
- Strategic philosophy: Why 10 years? Why constraints? Why anonymity?
- Risk assessment: Operational, strategic, organizational, moral failures
- **Proves:** Everything was intentional, strategic, part of coherent long-term vision

### 5. Technical Documentation (1 fragment)

**TECH_TOOL_001: Equilibrium.dll Documentation**
- SCADA backdoor malware for power grid load manipulation
- Deployment: 847 systems across 47 power utilities (April 2024)
- Attack vector: DLL side-loading (version.dll proxy in Siemens WinCC)
- Functionality: Intercept load balancing commands, create rolling brownouts
- C2 infrastructure: Domain fronting via CloudFlare (maintenance-updates.scada-systems.com)
- Anti-detection: AV evasion, SIEM evasion, mimics Windows Update traffic
- Bypass lists (ABSOLUTE): Hospitals, emergency services, critical infrastructure (never affected)
- Phase 3 activation: July 15, 2025, 06:00 EST
- Constraints: Max 2-hour brownout per zone, equipment protection maintained, remote kill switch
- Self-destruct: July 20, 2025 (delete all traces)
- **Educational Value:** SCADA vulnerabilities, DLL side-loading, C2 infrastructure, ethical constraints in malware

### 6. Ideology (1 fragment)

**IDEOLOGY_001: On Inevitability Manifesto**
- The Architect's philosophical treatise (March 2016, updated January 2023)
- **Chapter 1**: Entropy and Systems - Thermodynamics, fragility of centralization
- **Chapter 2**: The Illusion of Security - Security theater vs. actual security
- **Chapter 3**: Why We Are Not Terrorists - Constraints, no violence, no demands
  - Zero casualties requirement, reversible damage, institutional targets, no political demands
- **Chapter 4**: The Moral Calculus - Utilitarianism (justified), Deontology (unjustified), Virtue Ethics (depends on execution)
- **Chapter 5**: What Comes After - 3 scenarios (Society learns, ignores, overreacts)
- **Chapter 6**: To Those Who Join - What members are signing up for (prison risk, moral weight, stress)
- The Architect's 2023 postscript: Doubt is constant, but conviction remains
- **Reveals:** ENTROPY's genuine ideological motivation, ethical struggles, principled approach (even if misguided)

### 7. README Documentation

**README_ORGANIZATIONAL_LORE.md**
- Comprehensive guide to all 7 organizational fragments
- Discovery and player integration recommendations
- Cross-references (internal ENTROPY docs, existing LORE fragments, evidence templates)
- Educational value mapped to CyBOK domains
- Fragment statistics (50,000 words total)
- Narrative themes (complexity, fragility/resilience, means/ends, human cost)
- Usage guidelines for game developers
- Recommended discovery order for progressive revelation

## Organizational Structure Revealed:

**ENTROPY Network:**
- 5 operational cells: ALPHA, BETA, GAMMA, DELTA, EPSILON
- Each cell: 8-15 members
- 60+ total members, 120+ recruited assets
- Centralized leadership: The Architect
- Distributed operations: Cell autonomy within strategic framework

**Operational Capabilities:**
- Asset recruitment (4 vulnerability types, proven methods)
- Infrastructure compromise (financial, healthcare, telecom, energy, transportation)
- Advanced malware (Equilibrium.dll + others referenced)
- Secure communications (Signal, dead drops, PGP)
- Financial infrastructure (cryptocurrency, shell companies)

**Ethical Framework:**
- Zero casualty constraint (absolute requirement)
- Reversible damage only (72-hour demonstration window)
- Institutional targets (not individuals)
- Bypass lists for life-safety systems
- Members can exit safely

## Cross-References:

**Links to existing LORE:**
- Sarah Martinez = NIGHTINGALE case study in TRAIN_RECRUIT_001
- Operation Glass House = references in multiple training docs
- Phase 3 directive = expanded detail in OPCOM_001
- The Architect's philosophy = IDEOLOGY_001 manifesto

**Links to evidence templates:**
- TEMPLATE_001-006 identify specific assets
- Organizational LORE shows recruitment and management methods
- Combined: Complete picture of ENTROPY operations

## Educational Value (CyBOK):

**Training Materials:**
- Social engineering principles and insider threat recruitment
- Operational security for covert activities
- Psychological profiling and vulnerability exploitation

**Operational Communications:**
- Critical infrastructure protection priorities
- Coordinated attack response
- Multi-sector incident coordination

**Cell Protocols:**
- Organizational compartmentalization
- Covert communication methods
- Counterintelligence awareness

**Strategic Planning:**
- Long-term adversary planning
- Strategic vs. tactical threat analysis
- Risk assessment methodologies

**Technical Documentation:**
- SCADA security vulnerabilities
- Malware analysis (DLL side-loading, C2 infrastructure)
- Anti-forensics and detection evasion

**Ideology:**
- Threat actor psychology and motivation
- Hacktivism vs. terrorism distinctions
- Ethical hacking debates

## Gameplay Integration:

**Progressive Revelation:**
- Early: Training materials, cell protocols (structure)
- Mid: Operational comms, technical docs (capabilities)
- Late: Strategic planning, ideology (philosophy)

**Mission Design:**
- Phase 3 deadline creates urgency (July 15, 2025)
- Cell targets enable focused counter-ops
- Technical docs provide defensive intelligence

**Moral Complexity:**
- ENTROPY presented as principled antagonists
- Genuine ideological motivation (not pure malice)
- Ethical constraints (zero casualties, reversible damage)
- Players must grapple: Are they entirely wrong?

All fragments maintain narrative consistency, educational alignment with CyBOK security domains, and interconnected storytelling across the ENTROPY universe.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
2929bdb322 feat: Add TEMPLATE_006 (Message Logs) and comprehensive template documentation
Created Template 006 for encrypted messaging app evidence (Signal/Wickr) showing ENTROPY handler-asset communications, plus comprehensive README documentation for the entire template system.

## New Files:

### TEMPLATE_AGENT_ID_006_message_logs.md
- **Evidence Type:** Signal/Wickr encrypted messaging app logs
- **Key Feature:** Handler uses subject's REAL NAME 8 times in operational comms
- **Direct Identity Confirmation:** Definitive proof of NPC as ENTROPY asset
- **Evidence Strength:** 75% alone → 99% combined with other templates
- **High Cooperation Potential:** 85% base (subject wants out, shows coercion)

**5 Message Threads Included:**
1. Initial Tasking - Handler assigns data theft, uses real name
2. Operational Concerns - Subject worried, handler reassures
3. Coordination with Cell - Payment confirmed, second asset mentioned
4. Internal ENTROPY Comms - Handler briefs cell leader, confirms recruitment method
5. Escalation and Pressure - Subject wants out, handler threatens and coerces

**What Makes This Template Unique:**
- Only template with direct real name confirmation via ENTROPY internal comms
- Shows subject is KNOWN ENTITY within ENTROPY organization
- Reveals handler's OPSEC failure (using real names)
- Documents coercion and victimization (subject tried to quit)
- Provides intelligence beyond subject: handler contact, cell structure, operations
- Creates moral complexity: perpetrator who is also victim

**Substitution Variables (17 total):**
- [SUBJECT_NAME], [SUBJECT_CODENAME], [HANDLER_CODENAME]
- [CELL_DESIGNATION], [OPERATION_NAME]
- [HANDLER_PHONE], [SUBJECT_PHONE]
- [TARGET_ORGANIZATION], [DATA_TYPE], [SYSTEM_NAME]
- [AMOUNT], [MEETING_LOCATION], [DEADLINE_DATE]
- [DATE_1] through [DATE_5], [TIME_1] through [TIME_5]
- [PRESSURE_DETAIL], [SUBJECT_CONCERN]
- [SECOND_ASSET_CODENAME], [CELL_LEADER_CODENAME]

**Gameplay Integration:**
- Discovery: RARE (server compromise or handler device seizure)
- Unlocks: Handler arrest, second asset ID, cell mapping
- Interrogation approaches: Overwhelming evidence (85%), Empathetic victim-focused (90%), Strategic flip (90%)
- Intelligence yield: Cell structure, handler contact, dead drops, payment methods

**Educational Value (CyBOK):**
- Encrypted messaging security & limitations
- OPSEC failures in operational communications
- Mobile device forensics
- Digital evidence authentication
- Insider threat psychology and coercion tactics
- Counterintelligence and asset flipping

### README.md (Comprehensive Template System Guide)
- **Purpose:** Complete documentation for using all 6 evidence templates
- **Sections:** Quick start, substitution guide, best practices, examples

**Key Content:**
- Quick Start Guide (4 steps: Choose templates → Gather values → Substitute → Deploy)
- Complete 6-template overview with summaries
- **Complete Substitution Variable Reference Table:**
  - Core Identity (3 variables - used in ALL templates)
  - ENTROPY Operational (7 variables)
  - Financial (4 variables)
  - Technical/System (3 variables)
  - Communication (3 variables)
  - Location (3 variables)
  - Temporal (5 variables)
  - Contextual (4 variables)
- Evidence Combination Strategies (5 strategic paths)
- Interrogation Approaches by Evidence Collected (clear unlocks)
- Best Practices (DO/DON'T lists)
- Rarity and Discovery Recommendations (progression table)
- Success Metrics and Gameplay Impact (evidence count → outcomes)
- Customization Examples (3 complete NPC scenarios with all substitutions)
- Educational Value Summary (CyBOK alignment)
- Quick Reference Checklist

**DO/DON'T Best Practices:**
✓ Replace ALL placeholders
✓ Keep values consistent across templates for same NPC
✓ Match timeline chronologically
✓ Consider cooperation potential
✗ Don't leave [BRACKETS] in final version
✗ Don't require 100% collection
✗ Don't over-punish coerced NPCs

## Updated Files:

### TEMPLATE_CATALOG.md
- Updated template count: 5 → 6
- Updated section title: "The Five Evidence Templates" → "The Six Evidence Templates"
- Added complete Template 006 entry with:
  - Full substitution variable list (17 variables)
  - Message thread summaries
  - Real name usage pattern analysis
  - 9 red flags documented
  - Evidence strength progression
  - Gameplay integration details
  - Forensic & legal assessment
  - Cross-references to other templates
  - Discovery scenarios and timing
- Updated Evidence Chain diagram to include Message Logs
- Updated Confidence Thresholds table: Added 6-template row (99.9% confidence, 95% cooperation)
- Added 2 new combination strategies:
  - "Real Name Confirmation + High Cooperation" (Templates 006 + 005 + 002 = 99%, 95% cooperation)
  - "Complete Cell Mapping" (Templates 006 + 004 + 002 + 003 = 99.9%, enables handler arrest)
- Added Template 006 to Discovery Placement Recommendations (Very Hard, Late investigation)
- Updated Expansion Opportunities: Renumbered future templates 007-011 (was 006-010)
- Updated Version History: Added v2.0 entry
- Updated Quick Reference Card: Added Template 006 with  NEW marker

## System Impact:

**Template System v2.0:**
- Total Templates: 6 (was 5)
- Total Substitution Variables: 32+ unique placeholders
- Evidence Chain: 6-step progression from suspicion → definitive proof
- Maximum Confidence: 99.9% (all 6 templates)
- Cooperation Range: 50% (1 template) → 95% (all 6 with empathetic approach)

**New Capabilities:**
- Direct real name confirmation via ENTROPY internal comms
- Handler identification and arrest enablement
- Cell structure mapping
- Second asset discovery at same organization
- Coercion documentation for cooperation agreements
- Highest cooperation potential (85-95%)

**Documentation Completeness:**
- Quick start guide for new users
- Complete variable reference (32+ variables documented)
- 5 evidence combination strategies
- 8 interrogation approach unlocks
- 3 complete NPC customization examples
- Educational value mapped to CyBOK

## Integration Notes:

**Template 006 Cross-References:**
- Corroborates Template 002 (payment amounts match message discussions)
- Corroborates Template 003 (data extraction dates align with tasking)
- Corroborates Template 004 (dead drop timing/location matches messages)
- Corroborates Template 005 (emotional arc: trapped, wants out)
- Connects to RECRUITMENT_001 (financial pressure methodology)
- Connects to TACTICAL_001 (if operation is infrastructure attack)
- Connects to LEVERAGE_001 (pressure detail as leverage point)

**Recommended Discovery:**
- Rarity: RARE (Very Hard)
- Timing: Late game (Mid-game for major operation rewards)
- Prerequisites: Server compromise OR handler device seizure
- Value: Very High (real name confirmation + handler intel + cell mapping)

All templates maintain narrative consistency, CyBOK educational alignment, and infinite reusability through [PLACEHOLDER] substitution system.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
b5d3ee33c4 feat: Add reusable evidence template system for ENTROPY agent identification
Created 5 comprehensive evidence templates with [PLACEHOLDER] substitution system that enable infinite NPC agent identification across scenarios.

## New Files:
- TEMPLATE_AGENT_ID_001_encrypted_comms.md
  * Intercepted PGP-encrypted communications
  * 40% confidence alone, 90% combined
  * Red flags: Policy violations, ProtonMail, after-hours timing

- TEMPLATE_AGENT_ID_002_financial_records.md
  * Bank transactions & cryptocurrency forensics
  * 60% confidence alone, 98% combined
  * Red flags: Unexplained cash, ENTROPY wallet, shell companies

- TEMPLATE_AGENT_ID_003_access_logs.md
  * IT audit showing unauthorized system access
  * 70% confidence alone, 98% combined
  * Documents 5 incidents: Reconnaissance → Exfiltration → Cover-up

- TEMPLATE_AGENT_ID_004_surveillance_photos.md
  * 14-day surveillance op with 7 photo scenarios
  * 50% confidence alone, 95% combined
  * Handler identification, dead drops, countersurveillance

- TEMPLATE_AGENT_ID_005_physical_evidence.md
  * Handwritten 3-page emotional confession
  * 80% confidence alone, 99.9% combined
  * Enables 95-98% cooperation through empathetic approach
  * Arc: Willing participant → Trapped → Desperate for help

- TEMPLATE_CATALOG.md
  * Complete template system documentation
  * Substitution guide & best practices
  * Evidence chain methodology
  * Integration strategies & success metrics

## Template System Features:
- [PLACEHOLDER] format for runtime substitution
- Evidence chain: Single evidence (40-80%) → All 5 (99.9%)
- Cooperation likelihood scales with evidence quality
- Multiple interrogation approaches unlocked by different combinations
- Infinite reusability across NPCs and scenarios

## Integration:
- Updated GAMEPLAY_CATALOG.md with template section
- Evidence Prosecution category expanded from 1 to 6 fragments
- Total gameplay-focused fragments: 13 (8 unique + 5 templates)
- Templates work standalone or combine for overwhelming cases

## Educational Value (CyBOK):
- Digital forensics (email analysis, blockchain tracing)
- Insider threat detection (behavioral indicators)
- Investigation methodology (evidence corroboration)
- Legal process (admissibility, chain of custody)
- Psychological profiling & ethical interrogation

## Gameplay Impact:
Each template enables different player actions and unlocks specific interrogation approaches based on evidence collected. System designed to reward thorough investigation while not requiring 100% collection for success.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
56b0b654f1 feat: Add gameplay-function LORE fragments with mission integration
Created 8 gameplay-focused LORE fragments organized by what players
can DO with the information, not just narrative content. Each fragment
enables specific mission objectives, player choices, and success metrics.

**Organization by Gameplay Function:**

📋 Evidence Prosecution (1 fragment):
- ALPHA_07 criminal conspiracy communication
- Enables: Federal prosecution, arrest warrants, 95% conviction rate
- Unlocks: Protection for Sarah Martinez, tactical arrests

🎯 Tactical Intelligence (1 fragment):
- 48-hour countdown to power grid attack
- Enables: Time-pressure mission, 3 tactical approaches
- Unlocks: Grid defense, prevents Phase 3 backdoor installation
- Branching: Hard takedown / Insider flip / Extended surveillance

💰 Financial Forensics (1 fragment):
- Complete crypto trail from Sarah's payment to master wallet
- Enables: $8.2M asset seizure, funding disruption
- Unlocks: The Architect identity clues, shell company network
- Impact: -60% ENTROPY operational capacity if successful

🎣 Recruitment Vectors (1 fragment):
- ENTROPY's internal asset recruitment playbook
- Enables: Prevention programs, counter-recruitment, sting ops
- Unlocks: At-risk employee identification, pipeline disruption
- Impact: -30% to -50% future insider threats

🔓 Technical Vulnerabilities (1 fragment):
- SCADA zero-day Equilibrium.dll complete analysis
- Enables: Detection scripts, patch deployment, infrastructure hardening
- Unlocks: Grid protection before Phase 3, honeypot strategies
- Success metric: 100% patched = no Phase 3 grid failures

📍 Asset Identification (1 fragment):
- Complete surveillance package on 3 CELL_DELTA_09 subjects
- Enables: Coordinated arrests, tactical planning, insider cooperation
- Unlocks: Robert Chen flip opportunity, optimized approach
- Success: 85-95% based on intel collected

👥 Victim Testimony (1 fragment):
- Hospital administrator emotional testimony (patient death from ransomware)
- Enables: Emotional investment, motivation, dialog options
- Unlocks: Moral context, interrogation appeals, "Remember Why We Fight"
- Impact: Player engagement, meaningful success/failure consequences

🔄 Leverage Materials (1 fragment):
- Cascade's mother cancer treatment leverage analysis
- Enables: Operative turning, 4 distinct ethical approaches
- Unlocks: CELL_BETA complete intelligence, redemption arc
- Choices: Compassionate (85% success) / Manipulative (45%) /
  Ethical refusal / Anonymous help

**Key Integration Features:**

Mission-Critical Intel:
- TACTICAL_001 triggers 48-hour countdown mission
- ASSET_ID_001 required for optimal tactical planning
- TECHNICAL_001 enables infrastructure protection
- All fragments improve success probability measurably

Branching Player Choices:
- Evidence: Prosecution vs. plea deals
- Tactical: 3 arrest strategies with different risk/reward
- Financial: Seizure priorities and timing
- Recruitment: Prevention vs. counter-recruitment vs. sting
- Technical: Patch race vs. honeypot vs. shutdown
- Leverage: Compassion vs. manipulation vs. ethical stance

Cross-Fragment Integration:
- Operation Glass House appears across 5 functions
- Power Grid Attack requires 3 fragments for optimal success
- The Architect identity clues scattered across all functions
- Success metrics compound (more intel = better outcomes)

Educational Value:
- All fragments teach CyBOK-aligned security concepts
- Real-world attack methodologies and defenses
- Legal, technical, financial, and human factors
- Ethical considerations in security operations

**Gameplay Catalog:**
Complete cross-reference system showing:
- Fragment interconnections and mission integration
- Success probability calculations
- Branching path outcomes
- Player progression through game
- Design principles for future fragments

Each fragment answers "What can I DO with this?" rather than
just "What does this tell me?" - making LORE collection
functionally valuable, not just completionist.

See story_design/lore_fragments/by_gameplay_function/GAMEPLAY_CATALOG.md
for complete integration guide and mission design examples.
2025-11-19 17:43:15 +00:00
Z. Cliffe Schreuders
d93a08c428 feat: Add comprehensive ENTROPY LORE fragments system
Created interconnected LORE fragment collection revealing ENTROPY's
world through discoverable artifacts. Organized by content type and
artifact format for progressive player discovery.

**Structure:**
- 4 content categories: ENTROPY Intelligence, The Architect,
  Character Backgrounds, Location History
- 7 artifact types: encrypted comms, intelligence reports, text notes,
  emails, voice messages, corporate docs, personal items
- Progressive revelation: early game intro → mid game connections →
  late game master plan

**10 Seed Fragments Created:**

ENTROPY Intelligence (5):
- Operation Glass House completion report (cell communication)
- Dead drop server list (compromised infrastructure)
- Thermite.py tool analysis (The Architect's signature)
- Operative "Cascade" profile (true believer)
- Complete organizational history (2015-2025, Phase 3 timeline)

The Architect (2):
- Philosophical manifesto on inevitability (ideology revealed)
- Phase 3 activation directive (July 15, complete master plan)

Character Backgrounds (3):
- Sarah Martinez confession email (insider threat desperation)
- Marcus Chen final voice message (civilian courage, survived!)
- Agent 0x99 axolotl philosophy (regeneration vs entropy)

Location History (1):
- Vanguard Financial complete history (25 years, breach, recovery)

**Key Features:**
- Interconnected narrative web (fragments reference each other)
- Educational value (CyBOK-aligned security lessons)
- Moral complexity (sympathetic characters on both sides)
- Emotional impact (personal stories, real consequences)
- Progressive mystery (builds understanding over time)
- Master catalog tracking all connections and discovery timing

**Thematic Elements:**
- ENTROPY: "For entropy and inevitability" - thermodynamic philosophy
- SAFETYNET: "For regeneration and resilience" - axolotl metaphor
- Phase 3: July 15, 2025 - infrastructure-wide coordinated attack
- Moral gray areas: desperate people, true believers, ethical constraints

Fragments demonstrate sophisticated threat actor (ENTROPY) with
decade-long planning, ideological commitment, and custom tooling,
opposed by dedicated defenders (SAFETYNET) who regenerate after
every setback.

See story_design/lore_fragments/MASTER_CATALOG.md for complete
interconnection map and expansion guidelines.
2025-11-19 17:43:14 +00:00
Z. Cliffe Schreuders
3746212267 docs: Add comprehensive CTF flag narrative integration system
Create design document explaining how CTF flags integrate into
Break Escape's narrative through ENTROPY's dead drop system.

Key concepts:
- Flags as ENTROPY coordination messages
- Drop-site terminals hidden in plain sight
- Why physical presence is required for infiltration
- Flag reward categories (equipment, intel, access, story)
- Complete gameplay loop from briefing to debrief
- Sample Ink dialogue for character interactions

This system allows SecGen CTF scenarios to be embedded
narratively while providing tangible gameplay progression.
2025-11-19 17:32:16 +00:00
Z. Cliffe Schreuders
eaac5c31c5 docs: Update documentation to reflect correct conversation flow pattern
Updated both INK_BEST_PRACTICES.md and NPC_HUB_ARCHITECTURE.md to
accurately document the conversation flow pattern we're using.

Key Corrections:

1. Personal Conversations:
   - Return to mission_hub WITHOUT #end_conversation tag
   - This allows seamless return to hub menu
   - Player can choose more topics without closing UI

2. Exit Options:
   - Located in mission_hub knot
   - Use pattern: #end_conversation -> mission_hub
   - Tag closes UI while preserving state at mission_hub
   - NOT -> DONE (which doesn't preserve hub state)

3. Flow Documentation:
   - Added clear step-by-step flow examples
   - Updated "How It Works" sections
   - Fixed all code examples to show correct pattern
   - Updated checklists and quick reference sections

4. Common Mistakes:
   - Added examples of WRONG patterns (tag in personal endings)
   - Added examples of CORRECT patterns (tag only in exit options)
   - Clarified why each approach matters

5. Tag Name Updates:
   - Changed references from old #exit_conversation to #end_conversation
   - Updated all game engine integration notes

This ensures documentation matches the actual implementation in
chen_hub.ink, netherton_hub.ink, and haxolottle_hub.ink.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
b611c883e0 fix: Apply mission_hub exit pattern to Netherton and Haxolottle
Applied the same conversation flow fix from chen_hub.ink to the other
two NPCs. Exit options now properly preserve state at mission_hub while
closing the conversation.

Pattern Applied:
  #end_conversation
  -> mission_hub

Instead of:
  #end_conversation
  -> DONE

This ensures:
1. Exit options close the conversation minigame (#end_conversation tag)
2. Story state is preserved AT mission_hub (not DONE)
3. Next conversation resumes from mission_hub with all options available
4. Player can have multiple conversation topics before choosing to exit

Files Updated:
- netherton_hub.ink (2 exit options)
- haxolottle_hub.ink (2 exit options)

Recompiled all hub JSON files.

All three NPCs now have consistent conversation flow behavior.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
c83ad8d519 json update 2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
91640d0503 Improve conversation example, returning to the hub while exiting the UI from the interaction with NPC 2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
2a888ccaa3 fix: Remove #end_conversation tag from personal conversation endings
Fixed issue where personal conversations were closing the entire interaction
instead of returning to mission_hub menu.

The Problem:
- Personal conversation endings had #end_conversation tag before -> mission_hub
- This caused the entire conversation to close when personal chat ended
- Player couldn't access mission_hub menu options after personal conversations

The Fix:
- Removed #end_conversation tags from conversation_end knots in ongoing_conversations
- Personal conversations now return to mission_hub WITHOUT closing
- Player sees mission_hub menu again with all available options
- #end_conversation tag remains ONLY in mission_hub exit options

Correct Flow Now:
1. Player chooses personal conversation topic at mission_hub
2. Has personal conversation
3. Personal conversation ends -> mission_hub (no tag)
4. Player sees mission_hub menu again
5. Player can continue with other options OR choose exit
6. Exit option has #end_conversation -> DONE (closes conversation)

Files modified:
- dr_chen_ongoing_conversations.ink
- netherton_ongoing_conversations.ink
- haxolottle_ongoing_conversations.ink

Recompiled all hub JSON files.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
b982158ce5 refactor: Move ink source files to scenarios/ink and add compilation script
Consolidated all ink source files into scenarios/ink directory for better
organization. All ink source files and documentation are now in the same
location as their compiled JSON output.

Changes:
1. Moved all .ink source files from story_design/ink/ to scenarios/ink/
   - chen_hub.ink and supporting files
   - netherton_hub.ink and supporting files
   - haxolottle_hub.ink and supporting files
   - All other ink source files

2. Moved documentation files to scenarios/ink/
   - INK_BEST_PRACTICES.md
   - NPC_HUB_ARCHITECTURE.md
   - ONGOING_CONVERSATIONS_README.md
   - README.md

3. Added scripts/compile-ink.sh
   - Automatically compiles all .ink files in scenarios/ink/
   - Outputs JSON to the same directory
   - Shows colored output with success/failure status
   - Provides compilation summary

Usage:
  ./scripts/compile-ink.sh

This consolidates the ink development workflow into a single directory
and provides an easy way to recompile all ink files after making changes.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
85b620cfcd feat: Add automatic conversation closing for graceful #end_conversation tag
Implemented proper handling for the #end_conversation tag to automatically
close the conversation UI without requiring manual ESC key press.

Changes:
1. Added event listener for 'npc-conversation-ended' event in setupEventListeners()
   - Saves NPC state when event is received
   - Automatically ends minigame and returns to game
   - Verifies event is for current NPC

2. Updated showCurrentDialogue() to detect graceful conversation endings
   - Checks for #end_conversation tag when story reaches hasEnded
   - If tag present, waits for event handler instead of showing manual exit message
   - Preserves manual exit message for unexpected/error END states

Flow:
- Ink script: #end_conversation -> DONE
- PhoneChatConversation processes tag and dispatches npc-conversation-ended event
- PersonChatMinigame receives event and automatically closes
- Player sees smooth transition back to game

This eliminates the "(End of conversation - press ESC to exit)" message
for normal conversation endings while preserving it as a safety fallback.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
b0c56f2eca fix: Change mission_hub exit options to use DONE instead of END
Fixes issue where choosing conversation exit options would show
"reached end of story" console message. All mission_hub exit points
now use:

  #end_conversation
  -> DONE

Instead of:

  #end_conversation
  -> END

This preserves conversation state at mission_hub while cleanly
ending the interaction without triggering ink's end-of-story behavior.

Updated hub files:
- chen_hub.ink
- netherton_hub.ink
- haxolottle_hub.ink

Recompiled all hub JSON files to reflect changes.
2025-11-19 13:44:30 +00:00
Z. Cliffe Schreuders
06685b5328 feat: Unify all NPC relationships to use 'influence' scoring
BREAKING CHANGE: Unified relationship variable naming

Old System (Per-NPC Variables):
- Dr. Chen: npc_chen_rapport with #rapport_gained/lost tags
- Director Netherton: npc_netherton_respect with #respect_gained/lost tags
- Haxolottle: npc_haxolottle_friendship_level with #friendship_gained/lost tags

New System (Unified Influence):
- Dr. Chen: npc_chen_influence with #influence_gained/lost tags
- Director Netherton: npc_netherton_influence with #influence_gained/lost tags
- Haxolottle: npc_haxolottle_influence with #influence_gained/lost tags

Benefits:
- Consistent scoring system across all NPCs
- Simpler to understand and balance
- Unified tag system (#influence_gained/lost)
- Messages still customized per NPC based on their personality

Files Changed:
- dr_chen_ongoing_conversations.ink: rapport → influence
- chen_hub.ink: rapport → influence
- netherton_ongoing_conversations.ink: respect → influence
- netherton_hub.ink: respect → influence
- haxolottle_ongoing_conversations.ink: friendship_level → influence
- haxolottle_hub.ink: friendship_level → influence
- PersonChatConversation.js: Updated getInfluenceMessage() for unified system
  - Now detects NPC ID and provides appropriate messages
  - Supports legacy tag names for backward compatibility
- INK_BEST_PRACTICES.md: Updated all examples and documentation
  - Variable naming conventions
  - Tag system documentation
  - All code examples
  - NPC-specific sections
- NPC_HUB_ARCHITECTURE.md: Updated influence system documentation
- Recompiled all hub JSON files

Messages by NPC:
- Dr. Chen: "Dr. Chen appreciates that" / "Dr. Chen is disappointed"
- Netherton: "Director Netherton approves" / "Director Netherton is displeased"
- Haxolottle: "Haxolottle likes that" / "Haxolottle seems disappointed"

All files compile successfully with unified influence system.
2025-11-19 13:44:30 +00:00