top of page

Protocol Corruption
ROLE
All Aspects
DESCRIPTION
In Protocol: Corruption, you play as antivirus software fighting to reclaim territory in a 1980s computer. This tactical tower defense game challenges you to strategically place Conquest Nodes to spread your color and build energy reserves while defending against waves of malicious viruses. Balance expansion with defense to conquer the infection and restore order. Will you succeed, or will the virus take control?
YEAR
2024
GENRE
Tower Defense
Engine
Unity Engine
PLATFORM
PC
Timeframe
10 weeks
Gameplay Overview






Orignal Systems
Scriptable Object Towers
Modularity for Flexible Gameplay:
-
Efficient Organization with Dictionaries
-
Minimal disruption to existing systems
-
Quick retrieval of key elements
-
-
Use of Scriptable Objects:
-
easy introduction of new units, nodes, or features.
-
-
Exposed Variables
-
Easy customization from within the inspector window
-



A* pathfinding
The Dynamic AI
-
random target selection for attacks.
-
Unpredictability forces players to reinforce defenses across multiple nodes.
-
Players must anticipate vulnerabilities and possible flanking opportunities from the AI.
-
Each surprise assault creates chaos, testing players' ability to maintain control.
-



Conquest Nodes
-
The Conquest Node System allows players to capture and control territory,
-
Players deploy Conquest Nodes to strategically expand their influence across the map,
-
-
players must manage their defenses to protect against enemy AI incursions.
-
Enemy AI poses a significant threat, as it can corrupt player units, turning them against their former allies.
-
Corrupted units disrupt player strategy, adding layers of intensity and risk to encounters.
-
-
Mastering Conquest Nodes is essential for dominating the corrupted environment and pushing back hostile forces.
-
This creates an immersive loop of strategic capture, defense, and effective resource management.



Onboarding Players
.png)
%20(1).jpg)
Game Design Document
bottom of page