The God Eater's Path

Chapter 77: Visitors

Quick Verification

Please complete the check below to continue reading. This helps us protect our content.

Loading verification...

The diagnostic station had a memory.

Lin Feng discovered it on day eight, three hours after Gao Jun left for the western settlements. Not a hidden compartment this time, nothing physical. The station's four active pillars contained operational logs. Processing records. Every diagnostic scan the station had performed was stored in the crystal pillars' molecular structure, encoded in the same formation-frequency format as the cylinder's personal diary. The logs went back to the station's initialization and continued through every scan, every correction protocol, every template analysis the equipment had ever performed.

The station had scanned the second Devourer. Cycle 408. The scan data was still there.

Lin Feng's supervisor-class access couldn't retrieve the full diagnostic. The scan data was classified at a level above his credentials, the detailed architectural report protected by the same command-class restrictions that guarded Repository Seven's strategic assets. But the operational log, the metadata and process record and notes the station's automated systems had appended to each scan, was accessible at supervisor level. The metadata told him what the scan had examined without showing him the results. The chapter headings of a book he couldn't read.

*Scan 7W-0041. Subject: Devourer-class practitioner, command level. Fragment count: [RESTRICTED]. Consumption history: [RESTRICTED]. Efficiency pre-correction: 73%. Efficiency post-correction: 91%. Correction protocol duration: 4 hours 17 minutes. Anomalies flagged: 3.*

*Anomaly 1: Cross-connection proliferation between core and peripheral architecture. Classification: Expected for consumption stage. Correction applied: Standard routing isolation.*

*Anomaly 2: Residual network connectivity through consumed component backdoor links. Classification: Expected for infrastructure-consumption practitioners. Correction applied: Selective link severance with architecture preservation.*

*Anomaly 3: Template self-modification capability detected. Classification: UNEXPECTED. No correction applied. Flagged for review by Station 12-North medical team.*

Three anomalies. The first two were familiar: the cross-connections that had jammed Lin Feng's thumb, the backdoor link that was currently counting down toward a network security probe. Expected problems. Known problems. Problems the pre-Abandonment system had encountered before and developed solutions for.

The third anomaly was new.

Template self-modification capability. The second Devourer's template had been doing something that the station's automated classification system hadn't seen before. Something unexpected enough to flag for human review rather than automated correction. Something the station didn't try to fix because it didn't know if fixing it would help or harm.

Lin Feng queried the station for details on anomaly three. The request hit the classification wall, command-level restriction, same as the scan data. The metadata showed him the anomaly's existence and category but not its content. The book's chapter heading without the chapter.

He tried a different approach. The station's operational logs included cross-references, links between scans and anomalies and the various diagnostic sessions the equipment had performed over its operational lifetime. If the self-modification anomaly had been flagged in other scans, the cross-references might provide additional context.

The search returned one result. Not from the second Devourer's scan. From an earlier session.

*Scan 7W-0003. Subject: Non-Devourer practitioner, standard template. Fragment count: 44. Purpose: Baseline calibration of diagnostic sensors. Anomalies flagged: 0. Note: Baseline established. Station 7-West diagnostic suite operational. Calibration subject template shows no self-modification markers. Control confirmed.*

A calibration scan. The third scan the station had ever performed, early in its operational life. A standard procedure to establish baseline readings by scanning a normal practitioner's template. The cross-reference existed because the calibration scan had been used as the control against which anomaly three was measured. The second Devourer's template showed self-modification markers. The calibration subject's template didn't. The anomaly was specific to the Devourer's Path.

Self-modification. His template was modifying itself.

Lin Feng's routing sense turned inward. The upgraded perception, the resolution increase from Repository Seven's transfer further refined by eight days of manual optimization, examined his own template architecture with the granularity the station's partial scan had provided. He looked for modification markers. For evidence that his template was changing itself without his knowledge or direction.

He found them.

Not where he expected. Not in the consumed node cluster or the native fragment arrangement. The modifications were happening in the integration buffer, the component that managed new data absorption. The layer between his template's existing architecture and any incoming formation information. The buffer that had processed the junction node's consumed data, that had handled the transfer payload from Repository Seven's mechanism, that had managed every optimization he'd performed over the past eight days.

The buffer was growing.

Not in capacity, but in complexity. The integration layer that had started as a simple filter was developing new functions. Processing capabilities that hadn't been there when Lin Feng first consumed the junction node. The buffer was adding subroutines to itself. Tiny modifications, each one small enough to escape notice during the daily chaos of optimization work and roll-call deferrals and investigation teams. A new filtering algorithm here. A data-sorting function there. An assessment protocol that evaluated incoming information against criteria that Lin Feng hadn't set and couldn't identify.

The buffer was evolving. Adapting. The template's integration layer was teaching itself to be better at its job through incremental self-modification, the same kind of iterative improvement that the corrupted organisms' overlays demonstrated through generational adaptation, but happening inside a human template instead of a biological corruption system.

The Devourer's Path was modifying the tool that managed consumption. Making the tool more efficient, more discriminating, more capable. And it was doing this without asking, without reporting, without the conscious awareness of the practitioner carrying the template.

Lin Feng sat on the diagnostic platform. The four pillars hummed their passive scan. The amber light was warmer now, the hub's reserves at thirty-three percent, the increased intake filling the installation faster, the systems approaching operational thresholds that brought more functionality online. The fifth pillar, one of the two that had been dark since his first visit, flickered. A brief amber pulse, there and gone. The power reserves not quite sufficient for activation but approaching.

The self-modification was benign. Probably. The improvements to the integration buffer made his template better at processing consumed data: more efficient absorption, cleaner integration, fewer artifacts. The optimization work he'd been doing manually with Gao Jun's guidance was being supplemented by the template's own adaptive processes. The machine was helping to fix itself.

But the machine was fixing itself without his permission. Without his oversight. The modifications were invisible to his routing sense until he specifically looked for them, the changes occurring below his normal perception threshold, in the substrate of his template's architecture rather than the surface. If the self-modification capability decided to change something other than the integration buffer, if it turned its adaptive attention to his routing function or his perception system or his consumed node architecture, he might not notice until the changes were complete.

The station had flagged this as unexpected. The station hadn't tried to fix it. The station had referred it to a medical team that no longer existed.

Lin Feng filed the information. Added it to the growing catalog of things his template was doing that he didn't fully understand and couldn't fully control. The backdoor. The compliance protocols. The self-modification. The Devourer's Path wasn't just a method; it was an active process. A system that continued to operate after the initial consumption was complete, making changes, building connections, evolving the practitioner's architecture toward a destination that the practitioner hadn't chosen.

Toward what destination, he didn't know. The station's restricted data might contain the answer. The second Devourer's diagnostic report might describe where the self-modification led, what the template was building itself toward. But the answer was behind a command-level classification wall, and command-level required three hub-class consumptions, and that required years, and years were something the network's countdown wasn't going to give him.

---

Optimization point thirteen was a channel bypass.

The diagnostic had identified a redundant pathway in the consumed node cluster, a secondary routing channel that duplicated the function of a primary channel, carrying the same data through a parallel pathway that consumed energy without adding value. Eliminating the redundancy was conceptually simple: close the secondary channel, redirect its energy to the primary, let the primary handle the full load.

Gao Jun's theoretical model predicted a two-percent efficiency gain. Lin Feng's routing sense assessed the secondary channel and agreed with the prediction. Straightforward. Clean. The kind of optimization that should have been done first, not thirteenth.

He closed the secondary channel.

The energy redirected. The primary channel absorbed the additional load, its capacity sufficient, the energy increase well within its operational range. The redundancy was eliminated. His routing sense confirmed the efficiency gain: two-point-one percent. Template efficiency climbing from fifty-one-point-three to fifty-three-point-four percent.

Good.

Then the side effect.

The secondary channel, now closed, had been doing something besides carrying redundant data. His routing sense hadn't detected the additional function because the function operated below his perception threshold, in the substrate layer where the self-modification was happening. The secondary channel had been serving as a ventilation pathway. Formation energy in the consumed node cluster generated heat during processing. The heat needed somewhere to go. The secondary channel had been carrying waste heat away from the high-density cluster and dissipating it through Lin Feng's peripheral channels. A cooling system, running quietly in the background, doing a job that nobody noticed until it stopped.

The consumed node cluster's temperature climbed. Not dramatically. The increase was gradual, the thermal buildup slow enough that his routing sense registered it as a trend rather than an event. The cluster was warming. The junction points inside it were running hotter. The formation data processing, the routing function and the perception system and the data-layer reading, everything powered by the consumed architecture, was generating heat that had nowhere to go.

Lin Feng's routing sense degraded. Not the bandwidth compression from the roll-call crisis, a different kind of degradation. Thermal interference. The heat in the consumed cluster was producing noise in his formation-frequency signals. His perception became grainy. The resolution dropped. The conduit grid beneath the hub's floor went from sharp to slightly blurred, the junction points in the walls losing definition.

He tried to reopen the secondary channel. Couldn't. The closure was structural; the channel's formation-frequency boundaries had collapsed once the energy flow stopped maintaining them. The pathway was gone. Like a vein that clots when blood flow ceases.

"Good." The word was dry. Directed at the empty workshop. The particular monosyllable that Lin Feng used when processing a situation that was bad enough to require acknowledgment and simple enough to not require panic.

He needed a new cooling pathway. The consumed cluster was generating heat that the secondary channel used to dissipate, and without the channel, the heat was building. If the temperature continued to climb, the noise in his formation signals would increase, his perception would degrade further, and eventually the thermal stress would begin damaging the consumed architecture itself, the same kind of structural degradation that the roll-call compression would have caused, but from heat rather than friction.

The diagnostic station's passive monitoring tracked the temperature rise. The four pillars measured the thermal output of the consumed cluster every sixty seconds, and the trend line was linear. Steady increase, no plateau, the heat climbing at a rate that would reach damaging levels in approximately four days.

Four days. Gao Jun would be back in hours. The analyst's overlay could scan the cluster's thermal profile and identify an alternative cooling pathway. The research division's theoretical models might include documentation on consumed architecture heat management; three centuries of study had to have addressed thermal dynamics at some point.

But four days was not urgent. Four days was a deadline, not a crisis. And the two-point-one-percent efficiency gain from the channel closure was real, functional, an improvement that would compound with the remaining optimizations and the eventual station correction. He'd traded a cooling pathway for efficiency. The trade might be worth it if he could find an alternative cooling solution before the heat became dangerous.

He checked the hub's power reserves. Thirty-three-point-two percent. Climbing at approximately two percent per day with the doubled intake. The fifth diagnostic pillar flickered again, a longer pulse this time, the amber glow holding for half a second before dying. The pillar was approaching its activation threshold. Another few percentage points and it would come online. Five pillars instead of four. Not the full six needed for the correction protocol, but more diagnostic coverage. More data.

The data-layer traffic in the conduit network caught his attention. His degraded perception, grainy but still functional, detected a change in the background chatter. The automated status reports that had been flowing through the grid since the cascade began were still present, still cycling on their twelve-minute intervals. But something new had entered the data stream.

A query. Not a registration roll call, a different format. The query was structured as a network-wide broadcast, transmitted through every conduit line simultaneously, the formation-frequency equivalent of an all-channels announcement. The message reached Lin Feng's data-layer perception through the hub's floor, through the conduit connection, through the same pathway that carried status reports and roll-call responses.

*Network Infrastructure Recovery Protocol: Phase 2 initiated. All hub-class installations report structural integrity. All junction-class nodes report operational capacity. All conduit segments report energy throughput. Compliance timeline: 30 days. This is an automated recovery sequence. No administrative authority required.*

Phase 2. The network was escalating. Phase 1 had been the cascade, the passive energy propagation, the gradual warming of dormant systems, the slow bootstrap from ten thousand years of sleep. Phase 2 was active. The network's automated recovery protocols, running without human direction, moving from passive warming to active diagnostics. Inventorying its own infrastructure. Counting its hubs and nodes and conduits the way a body counts its limbs after waking from unconsciousness.

Phase 2 didn't require his response. The query was directed at infrastructure installations, not at consumed components. Hub Seven-West would respond automatically, the hub's own systems composing a structural integrity report and transmitting it through the conduit network without Lin Feng's involvement. The hub was an installation. Installations reported to the network. Lin Feng's authorization didn't change that process any more than a tenant's lease changed the building's response to a fire alarm.

But the Phase 2 query carried metadata. Scheduling information. The recovery protocol's automated timeline, embedded in the query's header data, describing what came after Phase 2.

*Phase 3: Network Administrative Services activation. Timeline: 45 days post-cascade initiation. Services include: Component registry management. Resource allocation optimization. Security monitoring. Anomaly investigation.*

Phase 3 would activate the network's administrative brain. The system that managed components, including consumed components like his junction node. The system that would process his deferred registration, send the third query, and eventually dispatch a command-level probe through his backdoor. Phase 3 was forty-five days post-cascade. The cascade had begun when he'd consumed the junction node. That was, he counted, twelve days ago.

Forty-five minus twelve. Thirty-three days until Phase 3.

His original calculation had the third registration query arriving in twenty-one days. Phase 3 activation in thirty-three. The registration timeline was a subset of the recovery timeline. The roll-call system was Phase 2 functionality: basic component tracking, automated queries, simple compliance protocols. Phase 3 would replace it with full administrative services. More sophisticated. More thorough. The difference between a roll call and an audit.

The diagnostic station needed to reach sixty percent power in fourteen days. Phase 3 activated in thirty-three. His backdoor needed to be closed before Phase 3, not just before the third registration query. The seven-day margin he'd calculated was actually a nineteen-day margin against the real deadline.

More time than he'd thought. He waited for relief.

It didn't come. Because Phase 3's capability list included *anomaly investigation.* And a hub drawing sixty percent of its conduit line's energy instead of the standard thirty was an anomaly. A consumed junction node reporting as a mobile component was an anomaly. A self-modifying template with supervisor-class access operating from a maintenance depot that nobody had visited in ten thousand years was an anomaly.

The network wasn't just counting its infrastructure. It was preparing to ask questions about what it found.

---

Gao Jun came back wrong.

Not injured. Not panicked. The thick body descending the rope at midnight carried the same load of supplies and the same professional control that every return carried. But his template was broadcasting differently. The sixty-three fragments were running at elevated output, not combat intensity, but the sustained alertness of a man who had encountered something on the surface that required ongoing assessment. The analytical overlay was active before his boots hit the stone floor. Working. Processing data that he'd collected outside.

"The settlements are talking," Gao Jun said. He dropped his pack. It hit the stone with a heavier thud than usual, more weight, more supplies. The supplies of a man who was stocking for a longer siege than planned. "The cascade is visible to civilians. Not directly; they can't sense formation-frequency energy. But they can see the effects. The crystal ground on the Barrens' western edge is glowing brighter. The ambient temperature in the settlements nearest the boundary has increased by three degrees. The local wildlife, non-corrupted animals, ordinary fauna, are migrating away from the Barrens' perimeter."

"The cascade's energy is bleeding past the boundary."

"The cascade is expanding the Barrens. The crystal ground is growing. The boundary between contaminated terrain and normal soil is shifting westward at approximately two meters per day. In the twelve days since the cascade began, the Barrens have expanded by roughly twenty-four meters." He sat on his workbench. The crystal rod appeared in his hand, not for light, for fidgeting. The formation crystal rotating between his thick fingers while his overlay processed the day's observations. "The settlements are alarmed. The nearest village, Qinghe, eight kilometers west, has sent runners to the regional authority requesting investigation. The regional authority is the Broken Sword Sect, which controls the territory west of the Barrens."

"A sect."

"A minor sect. Third-rate by pre-Abandonment standards. Maybe two hundred practitioners, the strongest at fifth stage, sixty to seventy fragments. They manage the region's security, collect taxes from the villages, and maintain the trade routes. They've been aware of the Barrens for centuries; it's a known hazard, a boundary on their territorial maps. A dead zone that nobody enters and nothing comes out of." The crystal rod spun. "The Barrens are expanding into their territory. Their dead zone is eating their farmland. They're going to investigate."

"A sect investigation is different from the research division's investigation."

"A sect investigation is practitioners with weapons who don't understand formation infrastructure and treat anything they can't control as a threat to be eliminated. The research division studies the Barrens. The Broken Sword Sect will try to stop whatever is making the Barrens grow." He set the rod down. "They'll fail; you can't stop a cascade by attacking crystal with swords. But they'll come to the boundary. They'll enter the expanded zone. They'll find the conduit lines and the elevated energy and they'll follow the energy to its source, which is the same conduit line that led us to this hub."

Another clock. Another set of people moving toward Hub Seven-West, driven by different motivations but converging on the same location. The research division, approaching from the east with analytical tools and authorization handshake attempts. The Broken Sword Sect, approaching from the west with weapons and territorial alarm. Lin Feng in the middle, sitting underground in a maintenance depot, waiting for a diagnostic station to power up while his template's consumed architecture counted down toward a network probe he couldn't block.

"How long until the sect reaches the boundary?"

"The runners left Qinghe two days ago. The regional authority responds to boundary threats within a week. Field teams deploy within days of the decision. If the Broken Sword Sect's leadership treats the expansion as a priority, and an expanding dead zone eating farmland is definitionally a priority, their investigators will reach the Barrens' western edge within five to seven days."

Five to seven days. The research division's team would return with a refined handshake attempt in a similar timeframe. The network's Phase 3 activation in thirty-three days. The diagnostic station's power threshold in fourteen.

"There's something else," Gao Jun said. The rod was in his hand again. Not spinning. Gripped. The formation crystal dimming under the pressure of thick fingers that had stopped fidgeting and started holding on. "The runner I spoke with in Qinghe, an old woman, the village's trade coordinator, someone I've sold harvested materials to for three years. She mentioned that the Broken Sword Sect received a visit last month. Before the cascade. Before any of this."

"A visit from who?"

"A man. Alone. High-level practitioner; she didn't know the stage, but the sect master met with him personally and the meeting lasted two days. The man left and the sect master increased patrols on the Barrens' boundary by three hundred percent. The patrols were already in place when the cascade began. The runner didn't know why the patrols had been increased a month before there was anything to patrol for."

"Someone warned them."

"Someone told the Broken Sword Sect to watch the Barrens before the Barrens became worth watching." Gao Jun met his eyes. The analytical overlay was running at full intensity, the research tools processing the implication with the thoroughness of instruments that didn't require sleep or optimism. "The research division didn't send anyone. I would have known; I'm their field analyst for this sector. The visit predates the cascade by a month. Whoever warned the sect knew the cascade was coming before it happened."

Before it happened. Before Lin Feng fell into the main hub's submerged architecture. Before he consumed the junction node. Before the cascade began.

Someone had known.

"The man," Lin Feng said. "Description."

"The runner didn't see him directly. Secondhand information from the sect's gate guards. Tall. Thin. Old, white hair, but moved like a young man. Wore robes instead of practical clothing." Gao Jun paused. "Carried no visible weapon. The gate guards said his template felt strange. They couldn't describe how. Just strange."

Lin Feng's routing sense was degraded from the thermal noise in his consumed cluster, and his left hand gripped the diagnostic platform's edge with three functional fingers, and the hub's amber light was warmer than it had been an hour ago because the power reserves were climbing and the cascade was growing and someone had known it would happen a month before the boy who caused it had even entered the Barrens.

"Strange how?" he asked, though he already suspected the answer.

"The guards said his template didn't feel like a practitioner's," Gao Jun said. "It felt like infrastructure."