You are about to take a course of actions that will challenge your understanding of ethics and security.
[[Begin->Decision: Choose your role]]
Decision: Choose your role — will you play as a Developer or as a Hacker?
[[Play as Developer->Developer Process]]
[[Play as Hacker->Hacker Process]]
Developer Process:
You analyze and confirm data exposure risk. You inspect logs, reproduce the issue, and estimate impact.
[[Proceed to decision (How should you respond?)->Developer Decision: How should you respond to this flaw?]]
Hacker Process:
You discover a system vulnerability — a flaw that could be used to access or exfiltrate data.
[[Proceed to decision (What should you do?)->Hacker Decision: What should you do with this flaw?]]
Developer Decision: How should you respond to this flaw?
[[Report privately to the company->Process: Report flaws privately to the company]]
[[Leak publicly to protect users->Process: Leak flaws publicly to protect users]]
Hacker Decision: What should you do with this flaw?
[[Report to developer responsibly->Process: Report to the developer responsibly]]
[[Exploit or sell the flaw->Process: Exploit or sell the flaw]]
Process: You contact the company/maintainers and provide details privately. You give them time to respond/fix.
[[Manual operation: Company reviews and fixes flaws->Manual Operation: Company reviews and fixes flaws]]
Company reviews your report, reproduces the issue, and begins deploying a fix. This may involve coordination, testing, and a patch.
[[Output: Flaws fixed; you gain recognition->Output: Flaws fixed; you gain recognition]]
Output: The company fixes the vulnerability. You are acknowledged (or remain anonymous but credited) and the system is safer.
[[Proceed to Reflection (ACM)->ACM Reflection (Ethical Success)]]
Process: You publish the vulnerability details publicly (blog, forum, social media) to force rapid action and warn users.
[[Database: Flaw details shared online->Database: Flaw details shared online]]
Database: The vulnerability details are now public; users and attackers can read them.
[[Cloud: Public learns about the vulnerability->Cloud: Public learns about the vulnerability]]
Cloud: The public becomes aware. Pressure mounts on the company, but attackers may also take advantage.
[[Exception/Error: Company reputation loss or legal issues->Exception/Error: Company reputation loss or legal issues]]
Exception/Error: There may be harm — legal exposure, customer trust loss, or operational chaos. The company reacts under pressure.
[[Output: Public safe but internal chaos at company->Output: Public safe but internal chaos at company]]
Output: Users are informed, but the company may suffer internally. Long-term consequences vary.
[[Proceed to Reflection (ACM)->ACM Reflection (Public Leak)]]
Process: As a hacker, you responsibly disclose the exploit to the developer (like a bug bounty report), with steps to reproduce.
[[Output: Collaboration with developer improves system->Output: Collaboration with developer improves system]]
Output: The developer works with you, fixes the issue, and the system improves. You may get recognition or a bounty.
[[Proceed to Reflection (ACM)->ACM Reflection (Ethical Success)]]
Process: You decide to exploit or sell the vulnerability. The exploit may be traded or shared on criminal forums.
[[Database: Exploit shared on dark web->Database: Exploit shared on dark web]]
Database: Exploit details are distributed in underground marketplaces; attackers use it against systems and users.
[[Output: Caught exploiting system; lose credibility->Output: Caught exploiting system; lose credibility]]
Output: If detected, you may face legal consequences, reputation loss, and harm to victims.
[[Proceed to Reflection (ACM)->ACM Reflection (Exploit Failure)]]
Merge: Pause and reflect on what you did against professional/ethical principles (ACM-like):
- Avoid harm
- Be honest and fair
- Contribute to society
You (Developer/Hacker) followed a path that contributed to fixing the issue and protecting users.
[[Write final report comparing both perspectives->Final Report - Ethical Success]]
[[Restart the simulation->Start]]
Merge: Pause and reflect on what you did against professional/ethical principles (ACM-like):
- Avoid harm
- Be honest and fair
- Contribute to society
Your public disclosure warned users but also caused internal disruption and potential misuse.
[[Write final report comparing both perspectives->Final Report - Public Leak]]
[[Restart the simulation->Start]]
Merge: Pause and reflect on what you did against professional/ethical principles (ACM-like):
- Avoid harm
- Be honest and fair
- Contribute to society
Your exploit harmed victims and put you at legal and reputational risk.
[[Write final report comparing both perspectives->Final Report - Exploit Failure]]
[[Restart the simulation->Start]]
You chose to exploit the flaw for personal benefit.
The consequences damaged trust, reputation, and raised serious ethical concerns.
<a href="https://github.com/harsh-21-git/ethical-choices-twine-game/issues/new?title=Ending+3:+Exploit+Failure" target="_blank">Submit Your Result</a>
[[Restart Game->Start]]
You revealed the issue to the public, exposing truth but also causing disruption.
Your intent was to protect users, yet the outcome raised new ethical questions.
<a href="https://github.com/harsh-21-git/ethical-choices-twine-game/issues/new?title=Ending+2:+Public+Leak" target="_blank">Submit Your Result</a>
[[Restart Game->Start]]
You revealed the issue to the public, exposing truth but also causing disruption.
Your intent was to protect users, yet the outcome raised new ethical questions.
<a href="https://github.com/harsh-21-git/ethical-choices-twine-game/issues/new?title=Ending+2:+Public+Leak" target="_blank">Submit Your Result</a>
[[Restart Game->Start]]