Deferred features

From NetHackWiki
(Redirected from Cerberus)
Jump to: navigation, search

The NetHack source contains code for several currently unimplemented features. Some of them are marked deferred, so they may or may not make it into the next version. Many of the following features are included in SLASH'EM.

Monsters

The beholder (e):[1] a type of floating eye (in fact many eyes on stalks coming out of an even bigger eye; derived from Dungeons & Dragons) with 5 gaze attacks: slowing, sleep, disintegration, stoning, and cancellation.

Depending on how the gaze attacks work (none of them are coded yet), the beholder could be an exceptionally nasty enemy.

The shimmering dragon (D):[2] This would leave shimmering dragon scales and let you create shimmering dragon scale mail, which would confer displacement. Monster displacement is not yet implemented, which may be why this dragon is not yet present. There would be corresponding baby shimmering dragons.

The vorpal jabberwock (J):[3] A tougher type of jabberwock (level 20 vs level 15), enabled in UnNetHack.

The vampire mage (V):[4] The next step up from a vampire lord, with spellcasting abilities.

Charon

Charon (@) and Cerberus are present in the source code[5][6] if CHARON is defined, but even if it is, they are both unique monsters which are not placed by any current map. Charon is a very high level peaceful human who, if true to his name's mythology, will ferry the player across the also-yet-to-be-implemented river Acheron/Styx for a fee.

Cerberus is a very high level dog who is tangentially related to Charon in Greek mythology, as the guardian of the gates to Hades. In the SLethe patch, he appears on the final level of the Lethe Gorge.

Objects

The spellbook of flame sphere[7] and spellbook of freeze sphere[8]: creates a tame flaming/freezing sphere which will eventually explode at hostile monsters. These spells are fully implemented into SLASH'EM and are starting objects for flame mages and ice mages respectively.

Reading a cursed spellbook could curse random inventory items [9] if it were of level 8 or higher. No such spellbooks currently exist.

There are comments in the source hinting at copper coins and silver coins.[10][11][12]

A special artifact attack of magic missiles (analogous to Fire Brand's fire, Frost Brand's cold, and Mjollnir's lightning), has been implemented.[13] The weapon's description, most likely a placeholder, is "imaginary widget".

Burying

There is code for "burying" both you and monsters ("The floor opens up and swallows <monster>!"). You can be buried, and stay alive for a while (eventually suffocating), and you have the opportunity to tunnel out.[14]

Other features

There is code that gives a 1 in 25 chance of applied bullwhips yanking a monster's weapon away from it, and it hitting you.[15]

There is code that lets monsters use scrolls of fire as a last-resort offense.[16]

There is code for creating force fields over an area of the map.[17]

There is a hint that randomising the order of the elemental planes is a possibility.[18] Some variants implement this, including UnNetHack and GruntHack.

There is code to give elves a luck penalty for wielding cold iron.[19]

There is a hero attribute nv_range which suggest intrinsic night vision may be implemented one day.[20]

The code for snagging shop inventory from outside the shop (currently requires a grappling hook) has a comment mentioning the possibility of telekinesis.[21] This is partially coded in several functions to do with picking up items.[22] [23][24]

There is a comment when using a stethoscope to make sure you have ears and are not deaf.[25] The ears check is not implemented.

There is code regarding invisible objects.[26]

According to definition in monst.c eating footrice and some other monsters should convey stoning resistance, but this is not implemented.[27]

There is code for enlightenment to report that you are "warned of undead", but there is no other reference to that property anywhere else in the game.[28]

See also

  • Defunct features: Features that have been present in some previous version of NetHack but have since been removed.

References

This page may need to be updated for NetHack 3.6.0.

It may contain text specific to NetHack 3.4.3. Information on this page may be out of date.

Editors: After reviewing this page and making necessary edits, please change the {{nethack-343}} tag to {{nethack-360}} or {{noversion}} as appropriate.