Optimization point nine broke his thumb.
Not literally; the bone was intact. But the channel pathway that served the thumb's motor control ran through a junction that Lin Feng was attempting to realign on day three, and the realignment produced a feedback spike that hit the thumb's nerve cluster with enough formation-frequency energy to overload the recovering signal from fragment twenty-six. The thumb, which had been twitching unreliably for days, locked. Full extension. The joint rigid, the tendon pulled taut, the digit pointing straight up from his left fist in a gesture that would have been rude if it had been the right finger.
"Stop," Gao Jun said.
Lin Feng stopped. The thumb stayed locked. His routing sense traced the feedback loop: the junction realignment had displaced energy into a channel that connected to his left arm's recovering pathways, and the displaced energy had overwhelmed the partial signal that fragment twenty-six was providing to the damaged limb. The thumb wasn't broken. It was jammed. The nerve cluster receiving a signal so loud that it couldn't process anything else.
"The junction connects to the arm pathways."
"Obviously." Gao Jun's overlay scanned the affected area. The analytical tools read the feedback loop's structure with the patient thoroughness of a diagnostic instrument that didn't care about the patient's discomfort. "The research division's channel topology maps don't include cross-connections between primary junctions and peripheral recovery pathways. Your template has them. The consumed architecture created links between your core formation structure and your damaged channels that the pre-consumption topology didn't have."
"The Devourer's Path connects everything."
"The Devourer's Path connects everything badly. The cross-connections are unplanned. They formed during the consumption integration, the node's architecture finding available pathways and linking to them regardless of whether the link was useful. Your thumb's recovery channel is connected to a primary junction because the consumption process needed a pathway and the damaged channel was the only one available." He withdrew the overlay. "Reverse the realignment. The junction can't be optimized without addressing the cross-connection first, and addressing the cross-connection requires the diagnostic station's full capabilities."
Lin Feng reversed. The junction returned to its previous configuration. The feedback loop dissipated. The thumb unlocked slowly, the rigid extension relaxing as the overloaded nerve cluster drained the excess energy. The digit dropped to a half-curl. Then twitched. Then moved on its own. Not the locked extension of the feedback jam, but voluntary motion. The thumb responding to fragment twenty-six's signal for the first time.
He stared at his left hand. Index finger: functional. Pinky: functional. Thumb: newly functional. Middle and ring fingers: still dead. Three out of five. The feedback spike had overloaded the thumb's nerve cluster, and the overload had kickstarted the dormant pathway the way a defibrillator restarts a stopped heart. Not gently, not through careful rehabilitation, but through raw energy forcing a connection that careful energy couldn't reach.
"That wasn't supposed to happen," Gao Jun said.
"Good."
The analyst looked at the thumb. At the three working fingers on a hand that had been entirely dead two weeks ago. His overlay ran an assessment that his face didn't display, the analytical tools measuring fragment twenty-six's signal strength to the thumb, the channel integrity, the probability that the recovery would sustain or degrade.
"The division's models don't predict channel recovery through feedback overload."
"The division's models are wrong about a lot of things."
"The division's models are wrong about things that haven't been tested. Thisâ" He gestured at the thumb. "âis testing."
Lin Feng closed his left hand. Three fingers gripped. Two hung slack. The grip was weak; the thumb's new functionality was unreliable, the signal flickering, the pathway raw from the overload. But three fingers was sixty percent of a hand, and sixty percent was sixty percent more than zero, and the math of recovery had shifted again without his permission and without his planning and he would take it.
---
Day four. Optimization point eleven. The first complete failure.
The target was a routing inefficiency in the native cluster, a pathway that carried energy between fragments three and seven through a detour that added six channel-widths to a route that should have been direct. The detour existed because fragments four, five, and six sat between three and seven in a configuration that blocked direct routing. The energy had to flow around the obstacle. The diagnostic had flagged the detour as a four-percent efficiency loss.
Gao Jun's approach: reposition fragment five to create a gap in the blocking configuration. Fragment five was a full-capacity native fragment, not partial, not consumed. It had been part of Lin Feng's template since before the Scripture's trial. Moving it should have been simpler than moving the consumed partial fragments, because native architecture was designed to be mobile within the template's topology. The pre-Abandonment cultivation system included fragment repositioning as a standard optimization technique. The research division had documentation on the process dating back three centuries.
The documentation was wrong.
Fragment five wouldn't move. Not because of tamper resistance or priority restrictions, because of something simpler and more fundamental. The fragment had been in its current position since Lin Feng's template had formed. Since before his meridians shattered. Since before the Scripture. The fragment wasn't held in place by engineering. It was held in place by biology. The channel architecture around fragment five had grown to accommodate it the way a tree grows around a fence post. Removing the fragment meant tearing biological tissue, formation-enhanced tissue, but biological.
Lin Feng tried for two hours. His routing sense pushed and pulled and coaxed and the fragment didn't budge and his channels ached and Gao Jun's overlay watched the futile process with the data-collection patience of an instrument that didn't get frustrated but was running out of variables to adjust.
"The native fragments are fixed," Lin Feng said. He stopped trying. The ache in his channels subsided slowly, the biological tissue recovering from the equivalent of someone trying to pull a post out of a living tree. "They can't be repositioned manually. The biological integration is too deep."
"The diagnostic station's correction protocol uses formation-frequency projection to temporarily soften the biological substrate before repositioning. The six-pillar system creates a field that loosens the tissue-fragment bond, allows the move, then hardens the substrate in the new configuration." Gao Jun's voice was clinical. Not disappointed. Recalibrating. "Without the station, native fragment repositioning isn't possible."
"How many of the remaining optimization points require native fragment repositioning?"
Gao Jun consulted the diagnostic data. The overlay cross-referenced the seventeen points against his maps of Lin Feng's template topology.
"Seven of the remaining twelve."
Seven out of twelve. Seven optimization points that couldn't be addressed manually. Five that could: consumed fragment adjustments, routing loop eliminations, channel pathway modifications that didn't require touching the biological substrate. Five points worth approximately eight to ten percent efficiency if all succeeded.
Current efficiency: forty-nine-point-one percent, after optimizations six through eight had added marginal gains over the previous day. Theoretical ceiling with manual optimization: fifty-seven to fifty-nine percent. The diagnostic station's full protocol could push to eighty.
"The station," Lin Feng said.
"The station." Gao Jun checked the hub's power reserves through the diagnostic platform's monitoring feed. "Twenty-nine percent. Up from twenty-three when we arrived. The cascade is feeding the reserves at approximately one percent per day. At this rate, sixty percent in thirty-one more days."
Thirty-one days. The math hadn't changed. The cascade was linear, steady, predictable, the infrastructure network's energy output increasing at a constant rate as more dormant systems came online and added their contribution to the grid. One percent per day. No shortcuts. No acceleration.
Unless.
Lin Feng's routing sense turned to the hub's architecture. The formation systems embedded in the walls and floor of Hub Seven-West, dormant, most of them, running at the minimum output that twenty-nine percent power reserves could sustain. The conduit maintenance array. The calibration suite. The diagnostic station. The emergency repair cache. Each system drawing power from the reserves, each system waiting for sufficient energy to activate fully.
But the hub also had a power input system. The conduit line that connected Hub Seven-West to the Barrens' network, the elevated-energy pathway that had led them here, was feeding the hub's reserves from the cascade's output. The input was passive. The hub received whatever energy the conduit network delivered, at whatever rate the cascade provided.
What if the input could be increased? Not by accelerating the cascade, the cascade was a network-wide phenomenon beyond his influence. But by adjusting the hub's intake. The conduit connection was a pipe, and the pipe had a valve, and the valve was set to a default aperture that had been configured ten thousand years ago by builders who hadn't anticipated that someone would want to fill the hub faster than the network's standard delivery rate.
He found the valve. A formation mechanism in the hub's floor, at the point where the external conduit line connected to the internal power distribution system. The mechanism was simple: a flow regulator, adjustable, designed to control how much energy the hub drew from the network. The regulator was set to thirty percent throughput. The hub was only accepting thirty percent of the available energy in the conduit line. Seventy percent was passing through, continuing northwest to the next node in the network.
"The intake regulator," Lin Feng said. "It's throttled."
Gao Jun's overlay found the mechanism. Scanned it. The analytical tools confirmed what Lin Feng's routing sense had discovered.
"Standard network configuration. Each hub draws a fraction of the conduit line's energy and passes the rest downstream. Prevents any single installation from draining the network. Adjustable, but adjusting requiresâ"
"Supervisor-class access."
"Which you have."
Lin Feng adjusted the valve. His supervisor-class credentials authorized the modification, the flow regulator responding to his template's administrative protocols with the quiet compliance of a system recognizing its operator. The throttle opened. Thirty percent became sixty. The hub's energy intake doubled.
The effect was immediate. The diagnostic station's pillars brightened, the amber glow intensifying as more power reached the installation's reserves. The corridor lights climbed from dim to moderate. The hub's dormant systems stirred. Not activating, but approaching activation, the increased energy bringing them closer to their operational thresholds.
"Power reserves will reach sixty percent in approximately fifteen days instead of thirty-one," Gao Jun said. His overlay ran the new projections. "You just cut the timeline in half."
"The downstream nodes will receive less energy."
"The downstream nodes are uninhabited maintenance points that nobody has visited in ten thousand years. They'll survive on reduced allocation." He paused. The analytical overlay flickered, the processing spike of a researcher encountering a variable he hadn't considered. "The network's administrative protocols might flag the adjustment. A hub drawing sixty percent instead of thirty is an anomaly. If the network's monitoring reaches operational status before we're finishedâ"
"Another clock."
"Another clock." He sat on the workbench. The stick was in his hand. He didn't draw anything, just held it, the way a man holds a tool when his hands need something to do while his brain works. "Fifteen days to sixty percent power. The diagnostic station runs the correction protocol. The correction closes the backdoor, optimizes the remaining twelve points, and pushes your efficiency toward eighty percent. During those fifteen days: the network's follow-up registration query arrives in three days, the research division's investigation team arrives in approximately the same window, and the cascade continues to wake infrastructure that might include network monitoring systems capable of detecting your intake adjustment."
"I know the clocks."
"Just making sure they're all on the same wall."
---
Day five. The wall above the third workbench.
Lin Feng found it during the hours between optimization sessions, when his channels needed rest and his routing sense needed occupation. He'd been mapping the hub's workshop in detail, every tool rack, every storage alcove, every formation mechanism embedded in the walls and floor. The mapping was practice for his upgraded perception, the way a musician practices scales between performances. His routing sense needed exercise. The upgraded resolution required calibration. The hub's workshop was a controlled environment, known architecture, stable signatures, no corrupted organisms, ideal for testing the limits of what his perception could do.
The wall above the third workbench looked the same as every other wall in the workshop. Pale gray stone. Formation infrastructure embedded at standard intervals. The same construction material, the same engineering, the same ten-thousand-year-old architecture.
Except.
His routing sense, at upgraded resolution, detected a density anomaly. The stone above the third workbench was thicker than the stone at the same height on the other walls. Two centimeters thicker. The difference was invisible to the eye, the surface flush, the texture identical. But the formation architecture behind the surface was different. Additional components. A layer of infrastructure that didn't exist in the corresponding sections of the other walls.
A sealed panel. Not a door, something smaller. A storage compartment, hidden behind a facade of standard wall construction. The kind of concealment that the pre-Abandonment builders used for items that required additional security beyond the hub's general authorization protocols. Repository Seven had its sealed chamber with consumption-class access requirements. Hub Seven-West had this: a hidden compartment, modest, the security through obscurity rather than through elaborate authorization mechanisms.
His supervisor-class credentials wouldn't open it. The compartment had no authorization mechanism, no contact point, no panel, no gate. The concealment was the security. If you didn't know it was there, you couldn't open it. If you knew it was there, the construction was simple enough to breach manually.
He told Gao Jun. The analyst examined the wall with his overlay and confirmed the density anomaly and said nothing for thirty seconds. The silence of a man whose four years of Barrens exploration had found plenty of hidden compartments and knew that hidden compartments contained either treasures or dangers and the distinction was usually academic.
"I missed this," Gao Jun said. The admission cost him something. A small cost: the analyst's pride in thoroughness, the professional's confidence in comprehensive assessment, dented by the fact that a boy with a dead arm had found something in a hub that the analyst had documented for the research division's records. "My overlay's resolution isn't high enough to detect two-centimeter density variations through stone. Your upgraded perception is."
"Can we open it?"
"The concealment layer is standard construction stone. No formation-frequency shielding. No defensive mechanisms." He produced his chisel. The blade that had killed corrupted wolves and excavated crystal growth and opened pre-Abandonment architecture through patient manual labor. "This is what I do."
The chisel work took forty minutes. Gao Jun cut through the facade layer with the methodical precision of a man who treated stone the way surgeons treated skin. Respectfully, precisely, with full awareness that carelessness damaged things you couldn't repair. The stone came away in clean sections. Behind it, the compartment.
Small. Thirty centimeters square. Fifteen deep. The interior was lined with formation-treated metal, the same dark steel as Gao Jun's blade, the surface inscribed with preservation characters that Lin Feng's routing sense identified as stasis maintenance. The compartment's contents had been kept in temporal suspension. No degradation. No aging. Whatever was inside had been preserved in the exact state it was in when the compartment was sealed.
Inside: a crystal cylinder. Smaller than the architectural template scrolls in Repository Seven, ten centimeters long, five in diameter. The surface was covered in formation characters so dense and fine that they appeared as a texture rather than individual inscriptions. The crystal was dark, not the pale crystal of the Barrens' surface, but a deep amber that matched the hub's operational lighting. Dense. Heavy for its size.
Lin Feng's routing sense touched it.
The cylinder responded. Not with a handshake but with a data burst. A compressed packet of formation-encoded information, stored in the crystal's molecular structure, released by contact with a compatible formation template. The data entered his routing sense and his consumed node architecture decoded it automatically, the same way it decoded network status reports and guardian construct communications, the infrastructure protocols processing the cylinder's data as a standard-format information package.
The data was a log. A personal record. Not the automated status reports of a network component or the administrative communications of an infrastructure system. A human record, encoded in formation-frequency format by someone who had used the pre-Abandonment network's communication protocols to create a diary.
The entry was dated. Cycle 408. Four days before the command-level Devourer had visited Repository Seven on cycle 412.
*Template diagnostic complete. Hub 7-West station confirms efficiency at 73%. Optimization protocol requires 6-pillar operation. Station 7-West has 6 operational pillars. Running correction protocol tomorrow. The cross-connections continue to proliferateâeach consumption adds pathways between the core architecture and the peripheral recovery channels. The medics at Station 12-North say this is normal for consumption-class practitioners at my stage. The body tries to route everything through everything. The correction protocol manages it. Without the protocol, without the stations, without the medicsâI don't know. The original walked alone. I have the network. I have the stations. I have people who understand what this path does to a body. He had nothing. No wonder he broke.*
Lin Feng read the log three times. Each reading landed differently. The first: information. A previous Devourer, at cycle 408, using this exact diagnostic station at six-pillar capacity to correct the same optimization problems Lin Feng was fighting manually. The second: recognition. The cross-connections, the same unplanned links between core architecture and peripheral pathways that had jammed his thumb an hour ago. Normal for consumption-class practitioners. Expected. Manageable with the right tools. The third: the last three sentences.
*The original walked alone. I have the network. I have people. He had nothing. No wonder he broke.*
The original. Old Ghost. The first Devourer, who had created the Scripture and walked the path without support infrastructure and without allies and without the diagnostic stations and maintenance depots that the pre-Abandonment civilization had built specifically to support the practitioners who came after him. Old Ghost had broken. The path had broken him, because the path was designed to break anyone who walked it alone, because the path's consumption process created problems that only external tools could solve.
Lin Feng set the cylinder down. The log's author, the second Devourer, the command-level practitioner who had visited Repository Seven four days later, had understood what Lin Feng was learning the hard way. The path required support. The machine required mechanics. The tool that couldn't examine itself needed someone else to hold the mirror.
Gao Jun read the log through his overlay. The analytical tools decoded the formation-frequency data and translated it into the research division's documentation format. The analyst sat on the workbench and read a ten-thousand-year-old diary entry by a practitioner whose path was the same as the boy sitting next to him, and his thick face showed something that wasn't friendliness and wasn't professionalism. Possibly the expression of a man realizing that three centuries of his division's theoretical work had just been confirmed by a cylinder hidden in a wall.
"There was a second Devourer," Gao Jun said.
"There was a second Devourer."
"The research division didn't know. The theoretical profile, the documents we found, described one practitioner. One Devourer. The original. We didn't know there was a successor."
"There was a successor and the successor had support. A network. Stations. Medics. The infrastructure wasn't just for the system. It was for the person using the system."
Gao Jun picked up the cylinder. Turned it in his thick fingers. The crystal caught the workshop's amber light.
"The research division needs to know about this."
"The research division is sending an investigation team to this fissure."
"The research division needs to know about this without knowing about the hub, or about you, or about the fact that their field analyst has been running an independent operation with a Devourer practitioner for eight days." He set the cylinder down. The decision was made before the crystal left his hand. "I'll handle it. The division doesn't need the source. They need the data. I can encode the log's content into a field report, attribute the discovery to a collapsed hub fragment found during a routine harvest, and transmit it through the conduit network's communication system."
"You'll give them your leverage."
"I'll give them knowledge they should have had three centuries ago. The leverage stays where it is, in Repository Seven, behind a consumption-class door that nobody but you can open." He stood. Pocketed the cylinder. "This changes the division's theoretical models. A second Devourer with a support network means the path is designed for cooperation, not isolation. The division's been building a profile of a lone practitioner. They need to rebuild it as a team architecture."
---
Day seven. Six hours before the network's follow-up registration query.
Lin Feng's routing sense detected the research division's investigation team at noon. Eight formation signatures, not two. Eight. The largest human group his perception had mapped in the Barrens. Their templates ranged from thirty-five to sixty fragments, the signature spread suggesting a mixed team: researchers at the lower end, security practitioners at the upper end. They were moving in formation, a professional patrol configuration, the security elements flanking the researchers, the whole group advancing along the conduit grid with the measured pace of people who expected trouble and had brought the means to address it.
They reached the fissure at dusk.
From the workshop, four levels underground, Lin Feng tracked them through his routing sense. The eight signatures circling the fissure's perimeter. Survey equipment deploying, analytical pulses more sophisticated than the two-person team's instruments. The pulses reached deeper. Hit the fissure walls. Penetrated the crystal layer and touched the pre-Abandonment stone beneath.
One of the pulses reached the sealed entrance mechanism.
"They found the door," Lin Feng said.
Gao Jun was already at the hub's entrance corridor, the corridor that led from the workshop to the sealed doorway. His blade was out. Not because he intended to fight eight practitioners, because the blade was what his hands reached for when the situation exceeded his ability to calculate comfortable outcomes.
"The mechanism is sealed. Supervisor-class. Their equipment can detect it but not open it."
"Their equipment is three centuries of reverse-engineering applied to pre-Abandonment technology. My frequency emitter failed on this mechanism. Their equipment is better than my emitter."
The analytical pulses continued. The investigation team was mapping the entrance mechanism's architecture, the formation characters, the authorization gate, the security classification. Professional work. Thorough. The kind of sustained analysis that a well-funded research division with three hundred years of institutional knowledge could bring to bear on a problem that interested it.
One of the eight signatures detached from the group. Moved to the fissure wall directly above the mechanism. The template was sixty fragments, the team's strongest practitioner. The formation signature produced an output pattern that Lin Feng's routing sense classified as a directed analytical probe, more powerful and more focused than the survey equipment. A personal capability, not a tool.
The probe reached the mechanism. Read the authorization gate. Processed the security classification.
And transmitted a query to the mechanism that was close, not identical, but close, to a supervisor-class authorization handshake.
"They're trying to crack it," Lin Feng said.
"How close?"
"The handshake is wrong. The frequency pattern is approximately eighty percent accurate. The mechanism won't accept it. The authorization gate requires ninety-five percent minimum match. But the attempt tells us they have enough understanding of supervisor-class protocols to get eighty percent of the way there."
"Eighty percent today. With the data they'll collect from this attempt, they'll refine the handshake. The next team will get to eighty-five. The team after that, ninety." Gao Jun's jaw worked, the grinding motion of a man chewing on a problem that didn't have a clean solution. "How many attempts can they make before the mechanism locks out?"
Lin Feng queried the hub's security systems through his supervisor-class access. The response was immediate.
*Authorization failure tolerance: three attempts per 24-hour cycle. Current failure count: one. Lockout threshold: ten cumulative failures. Lockout duration: permanent.*
"Ten attempts before permanent lockout. They've used one."
"Nine remaining. If they're smart, and they're smart, they'll stop after the first failure, take the data home, and come back with a better handshake." He sheathed the blade. The gesture was deliberate, the analyst deciding that the current threat was informational, not physical. "They won't get in today. But the clock just shortened."
The investigation team remained at the fissure for three hours. They didn't attempt the mechanism again. They mapped. Sampled. Documented. The sixty-fragment practitioner ran two more analytical probes that didn't target the mechanism directly but mapped the surrounding architecture, building a comprehensive picture of Hub Seven-West's exterior structure.
They left at nightfall. Eight signatures moving east, back toward the Barrens' edge. Carrying data that would feed the research division's analytical machines for weeks and produce a second handshake attempt that would be closer to the mark.
Lin Feng sat in the workshop. The diagnostic station hummed. The hub's power reserves sat at thirty-one percent, climbing faster now with the intake valve opened, the doubled energy flow bringing the sixty-percent threshold within reach in fourteen days. The follow-up registration query would arrive in six hours. The investigation team would return in weeks with a better handshake. The cascade continued its steady work of waking ten thousand years of dormant infrastructure.
And in his channels, his template processed the day's data, the failed optimization, the recovered thumb, the hidden cylinder, the investigation team's near-miss at the mechanism, and the consumed node architecture flagged the approaching follow-up query with the mechanical urgency of a system that knew its compliance deadline was approaching and had begun composing the next response before Lin Feng could decide what the response should say.
"The deferral option," Lin Feng said. "Can it be used twice?"
Gao Jun's overlay activated. The research tools reaching into the compliance protocol's code, reading the deferral clause's specifications with the same careful observation that had found it the first time.
The overlay searched. Read. Processed.
Gao Jun's face changed.
"The deferral clause has a usage limit," he said. "One deferral per registration cycle. The follow-up query begins a new registration cycle, but the cycle inherits the deferral history from the previous one. You can defer the follow-up, but the follow-up's follow-up won't accept a deferral. The third query requires full compliance."
"How long until the third query?"
"The second deferral buys another one hundred sixty-eight hours. One week. After that, the third query arrives and the response options are full compliance or non-response. Non-response flags the component as potentially compromised and escalates to network security protocols."
"What do network security protocols do?"
Gao Jun's overlay searched. Found the specification. Read it.
He didn't answer immediately. The stick in his hand rotated, the kinetic processing, the analyst's habit, the physical expression of a brain working a problem whose solution wasn't pleasant. The stick turned three full rotations before he spoke.
"Network security protocols for non-responsive components authorize remote diagnostic access through the component's backdoor connection," he said. "The network sends a probe through the link. The probe maps the component's current architecture, determines why the component isn't responding, and reports to the administrative system. The probe has command-level authority. Your supervisor-class access can't block it."
Fourteen days to sixty percent power. Fourteen days to the diagnostic station's correction protocol, which could close the backdoor. Twenty-one days until the third registration query triggered security protocols that would send a command-level probe through a backdoor he couldn't close without the station.
Fourteen versus twenty-one. Seven days of margin. If everything went perfectly, if the cascade held steady, if the hub's reserves climbed on schedule, if the diagnostic station activated and ran the correction protocol without complications, he would close the backdoor with exactly one week to spare.
If anything went wrong, the network would reach into his template and read him like a book.
"Defer the follow-up," Lin Feng said.
The compliance protocol composed the abbreviated response. Component 7W-14, operational, deferred. The packet transmitted through the backdoor, through the conduit network, east toward the main hub.
The second deferral. The last one.
Twenty-one days until the network came looking, and fourteen days until the only tool that could stop it finished warming up.