Exploit! Game Review

exploit_top

The Basics:

  • For ages 7 and up (publisher suggests 12+)
  • For 2 to 6 players
  • Approximately 15 minutes to complete

Geek Skills:

  • Active Listening & Communication
  • Logical & Critical Decision Making
  • Reading
  • Strategy & Tactics
  • Bluffing and Misdirection

Learning Curve:

  • Child – Easy
  • Adult – Easy

Theme & Narrative:

  • Survive being a pirate in the company of pirates

Endorsements:

  • Gamer Geek mixed!
  • Parent Geek approved!
  • Child Geek mixed!

Overview

There has been no wind for almost 3 weeks and the pirate crew is becoming more wrestles and unruly by the day. Fights are breaking out and friends are turning into enemies. Supplies are low and there is talk of mutiny. If you want to survive this voyage you’ll need to make certain you remove anyone who might get in your way before they remove you.

Exploit!, designed by Duncan Davis and published by Sherwood Games, is comprised of 9 Identity cards, 6 Role cards, and 3 Rules cards. The cards are as durable and as thick as your standard playing card. The artwork depicts various classic illustrations and paintings of pirates.

Game Set Up

To play the game, first shuffle and deal each player 1 Identity card, face-down. Players should always keep their current Identity card hidden from their opponents at all times.

Second, place the remaining Identity cards face-down in the middle of the playing area. This is the Identity draw deck. Leave room next to the draw deck for a discard pile.

That’s it for game set up. Determine who will go first and begin.

Pirate Espionage

Exploit! is all about uncovering secrets while maintaining you own. The game is played in turns with each player taking 1 action on their turn. A player’s turn is summarized here. Table talk is encouraged and can lead to players take certain actions with or without knowing the full truth.

Step 1: Select 1 Action

In total, there are 8 actions. Each action is assigned a color. Black actions are not role specific and are available to all players. Red actions tend to be the more aggressive. Blue actions tend to be more defensive. Each of the actions are summarized here and described in more detail in the next step.

  • Accuse (black): Guess a player’s identity.
  • Invent (black): Discard and draw a new Identity card.
  • Assassinate (red): Guess an opponent’s identity.
  • Spy (red): Look at an opponent’s Identity card.
  • Disguise (red): Draw a new Identity card and then discard an Identity card.
  • Sentinel (blue): Counter Assassination action.
  • Facade (blue): Counter Spy action.
  • Scour (blue): Look through the discard pile or draw deck, then shuffle.

A player’s Identity card will list 1 red action and 1 blue action. These actions belong to the identity and can be used by the player if they like. Doing so puts the player’s Identity card in jeopardy, however, as we will soon learn. All players can use the black actions without fear or immediate reprisal from their opponents, but there is still plenty of risk. A player can also attempt to use the other red and blue roles that are not on their card, but this is risky.

Long story short, a player is welcome to attempt to get away with anything they like. It only becomes a problem if they get caught doing something that they don’t have access to or draw too much attention to themselves.

exploit_identity

Example of some of the Identity cards in the game

Step 2: Take Action

After reviewing what they know the player selects an action, points to an opponent, and announces their intent.

Before the player can resolve the action, any opponent can call them a “liar”. Calling another player a “liar” means you don’t think they are using a red or blue role that is listed on their Identity card. Since every Identity card only has 1 red and 1 blue action, an opponent who uses 2 blue actions is obviously bluffing, but calling a bluff is not enough. At anytime during the game, another player can call someone a liar if a blue or red action is used. This is important because players can block actions during the game that could result in opponents losing. It’s therefore VERY important to keep track of who is doing what.

If a player is accused of bluffing, they must reveal their Identity card to the opponent who called them a liar. If the action they are using is listed on their Identity card, the opponent is out of the game, discarding their Identity card. A player should never accuse another opponent of being a liar when they use a black action, since all Identity cards have access to those even if they are not listed.

Each of the actions are described in more detail here.

Accuse (black)

If accusing another opponent, the player must name the opponent’s Identity card. At the start of the game, the player only knows their Identity. As the game continues, Identities will be discarded and new Identity cards drawn. Accusing an opponent early is not reasonable, but as the game continues, it will become clear which Identity cards are in play. When the player guesses the role, the opponent must reveal their card to the player. If it’s the correct name, the opponent’s Identity card is discarded and they are out of the game. If the player guessed wrong, they are out of the game.

Invent (black)

The player discards their current Identity card and then draws a new one. Everyone now knows who that player’s Identity was and might have a clue about what their new Identity might be.

Assassinate (red)

This action is a lot like Accuse, but will not result in the player’s death if they guess wrong. The player points to an opponent, announces who they think they are. At this point, things could go a couple of ways.

The opponent can use the Sentinel action to block the Assassination action. However, the player can then call the opponent a liar and their Identity card will be revealed. If the opponent has the Sentinel action, the player discards their Identity card. If the opponent doesn’t have the Sentinel action, they lose their Identity card.

Or….

The opponent simply accepts the results of the Assassination action and discards their Identity card.

Or…

The player guessed wrong. The opponent shows them their Identity card. Neither player loses their identity card.

Spy (red)

This action allows the player to look at an opponent’s Identity card. The target of the spying can use the Facade action to block it. Again, caution should be used, as a player could be called a liar for using a blue action that they may or may not have.

Disguise (red)

This action is resolved by drawing another Identity card. The player now has a choice. They can either keep their old Identity card or use the new one. Either way, they will be discarding 1 Identity card. The player should do all that they can to make it difficult for their opponents to determine if the old or the new Identity card is being kept.

This is similar to the Invent action, but is much more sneaky.

Sentinel (blue)

This action allows the player to block an Assassination action. It will always work unless the player is bluffing and caught by their opponents.

Facade (blue)

This action allows the player to block a Spy action. Like the Assassination action, it will always work unless the player is bluffing and caught attempting to trick their opponents.

Scour (blue)

Perhaps one of the most understated and most powerful of all the actions, Scour allows the player to look through the discard pile or the draw deck. This gives the player a wealth of information regarding what Identity cards are still in play or have yet to enter the game. Then the player gets to shuffle whatever pile or deck they selected and sit back with a smug look on their face. Knowledge is power in Exploit!, after all. But knowledge will make a player a target of reprisal, making this action a doubled edged sword.

Step 3: Ending Turn

The player’s turn is now over and the next player in turn order sequence now goes.

Ending the Game

The game ends when there is only 1 player left. Through assassination, bluffing, and manipulation, they have survived. Truly, they are a pirate of the highest rank and caliber.

To learn more about Exploit!, visit the game’s web page.

Final Word

The Child Geeks understood how to play the game and how the game could be won, but never reached a point where I felt they really “got the game”. I observed a lot of blatant guessing with little to no rhyme or reason. When I asked one Child Geeks why they guessed another player was the captain, he said, “He was acting bossy.” I about laughed myself into a coma, but the humor of it all could not hide the fact that the Child Geeks simply weren’t paying close enough attention. This is a Deduction game, which means players need to really focus in on what their opponents are and are not doing. A few of the oldest Child Geeks did this and were successful, but the majority of the Child Geeks were playing blindly because they never took the time to really observe. According to one Child Geek, “I like this game, but it’s really hard at first.” Yes, it is, and that’s why you have to play carefully until you start to get a better idea of who you are dealing with. Another Child Geek said, “I really like this game! It’s like a mystery you have to solve.” Also very true. It’s like playing a murder mystery game where the murderer is still walking around. This creates tension which was not lost on the Child Geeks. When all the games were over, the Child Geeks liked the game for the most part, but not enough to give it their full approval.

asdf

One brother attempts to bait the other as both attempt to assassinate each other. Such brotherly love….

The Parent Geeks were very pleased with this game, finding it to be an entertaining experience over coffee and cookies. One Parent Geek said, “This is a very quiet game, where I feel you have to observe everything to get a clear picture. It was a very different game playing experience and I enjoyed it very much.” Another Parent Geek said, “Not once did I really know who people were, but I always felt that enough information was being given to me to consider and respond to. This is a very elegant and wonderful game.” After the games, coffee, and various assassinations, the Parent Geeks voted to approve Exploit!

The Gamer Geeks understood how to play the game and immediately broke it. They all attempted to assassinate each other and that quickly brought a group of 6 Gamer Geeks to 3. From there, they played a bit more carefully, but were still reckless. After the first game was over, they played it again and this time gave the game their full attention. Lots of table talk and some very interesting metagame playing, as the Gamer Geeks attempted to figure out who was who. According to one Gamer Geek, “I’ve played games like this before and they are always interesting, but they also only work if you have the right group. That’s why I don’t get to play games like this too often.” Another Gamer Geek said, “I want there to be more back and forth in this game, like there is in Werewolf. I want to figure out who people are by using more than just their actions.” This came up a number of times and the Gamer Geeks discussed it in great detail. The majority of Gamer Geeks felt that the game did a good job of facilitating the fun, but there needed to be more back and forth with the players. In the end, the Gamer Geeks couldn’t agree that the game was a good one or a bad one and opted to simply say it was “OK”.

For the most part, I was pretty pleased with Exploit! The rules are a bit difficult to digest and you have to play the game at least once to understand how everything works. Overall, the game provides an excellent challenge, but to some of the players’ points, the success of this game is heavily dependent on the players at the table. If you don’t have individuals who are willing to sit, listen, observe, and attempt to trick the hell out of you, the game falls flat.

I think this is a great game for older Child Geeks and families. Gamer Geeks might find it a bit slow or a bit shallow at times since it’s pretty easy to knock a player out of the game or yourself. The best mix is a group of casual players who all know each other well enough to know when an opponent might or might not be liar. If you have such a group of friends, do take a look at Exploit! and set sail on the high seas of mistrust.

This game was given to Father Geek as a review copy. Father Geek was not paid, bribed, wined, dined, or threatened in vain hopes of influencing this review. Such is the statuesque and legendary integrity of Father Geek.

About Cyrus

Editor in Chief, Owner/Operator, Board Game Fanatic, Father of Three, and Nice Guy, Cyrus has always enjoyed board, card, miniature, role playing, and video games, but didn't get back into the hobby seriously until early 2000. Once he did, however, he was hooked. He now plays board games with anyone and everyone he can, but enjoys playing with his children and wife the most. Video games continue to be of real interest, but not as much as dice and little miniatures. As he carefully navigates the ins and outs of parenting, he does his very best to bestow what wisdom he has and help nurture his children's young minds. It is his hope and ambition to raise three strong, honorable men who will one day go on to do great things and buy their Mom and Dad a lobster dinner Cyrus goes by the handle fathergeek on Board Game Geek. You can also check him out on CyrusKirby.com. Yes, he has a URL that is his name. His ego knows no bounds, apparently....
Tagged , , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *