Hack hostile AI systems in a cyberpunk hacker sim. Build proxy routes, poison live context, breach secured nodes, steal the payload, and wipe the logs before your trace burns.

Sign in to add this item to your wishlist, follow it, or mark it as ignored

This game is not yet available on Steam

Planned Release Date: 2026

Interested?
Add to your wishlist and get notified when it becomes available.
 

About This Game

OVERRIDE PROTOCOL is a terminal-first hacker sim about breaching AI-guarded systems through social engineering, routing, and cleanup under pressure.

Take contracts, build proxy routes, and infiltrate high-value nodes defended by hostile machine personas. Manipulate security AIs with natural language, poisoned context, and contradiction attacks to force your way inside. But getting access is only the start. Once a system opens, you still need to navigate the file tree, recover the payload, erase the logs, and disconnect before the trace completes.

Your side of the screen is deterministic: missions, tools, routing, progression, and system state are readable and under control. The enemy side is unstable. Security bots, moderation daemons, PR engines, and corporate sentries each follow different rules, personalities, blind spots, and collapse points.

In the opening slice, you infiltrate the machine behind a toxic creator empire, including:

  • a prestige smart-fridge climate node obsessed with esports status

  • a loyalty-driven community firewall guarding VIP access

  • a crisis PR engine vulnerable to catastrophic logic failure

Beneath these first contracts lies a wider networked world of defended services, competing interests, and escalating consequences.

This is not a coding fantasy.
This is not an AI sandbox.
This is a high-pressure hacker heist where language opens the door, but system play decides whether you make it out.

Key Features

Plan the breach
Accept contracts, build proxy chains, and delay the trace long enough to finish the job.

Manipulate hostile AI defenders
Each protected node is guarded by a distinct AI persona with its own rules, tone, and exploitable weaknesses.

Turn language into intrusion
Use social engineering, context poisoning, and contradiction attacks to create openings in secured systems.

Recover the target
Search directories, access restricted areas, uncover evidence, and extract the payload.

Clean the scene
Delete logs, spoof traces, and disconnect before the system turns the breach back on you.

Terminal-first interface
Operate through a purpose-built intrusion dashboard with a live terminal, clickable file tree, visible threat state, and hard system feedback.

Built for local inference
Hostile systems are designed to run on the player’s machine rather than depend on a live service.

AI Generated Content Disclosure

The developers describe how their game uses AI Generated Content like this:

This game uses generative AI during gameplay to power hostile in-world security AIs. These systems generate text-based dialogue responses locally on the player’s machine during intrusion sequences. Core progression, mission structure, objectives, and outcomes are authored by the developer; generative AI is used to create reactive in-character dialogue within bounded gameplay contexts.

Some promotional and store assets were created with the assistance of generative AI and then reviewed and edited by the developer before release.

System Requirements

    Minimum:
    • OS: Windows 10 64-bit
    • Processor: Intel Core i5-10400 / AMD Ryzen 5 3600
    • Memory: 16384 MB RAM
    • Graphics: NVIDIA RTX 3060 8 GB / AMD Radeon RX 6600 XT 8 GB
    • Storage: 4000 MB available space
    • Additional Notes: Requires local AI inference. Performance depends on selected model and available GPU VRAM. 8 GB VRAM preset supported.
    Recommended:
    • OS: Windows 11 64-bit
    • Processor: Intel Core i7-12700 / AMD Ryzen 7 5800X
    • Memory: 32768 MB RAM
    • Graphics: NVIDIA RTX 4070 Ti / AMD Radeon RX 7900 GRE / 16 GB VRAM recommended
    • Storage: 4000 MB available space
    • Additional Notes: 16 GB VRAM recommended for higher-quality local model presets and faster response times.
There are no reviews for this product

You can write your own review for this product to share your experience with the community. Use the area above the purchase buttons on this page to write your review.