The Race to Patch

White Hat is an simultaneous play action selection style game where each player leads a team of hackers trying to patch vulnerabilities on their computer. Players race to be the first team to patch all 4 vulnerabilities, ending the game and hopefully scoring the most points in the process.

About White Hat

These are not your Hollywood hackers. Real hacking is done heads down at a computer, writing code, penetration and quality assurance testing, building applications to aid research, and maintaining computer hardware. White Hat does its best to simulate the real world of hacking and computer development in a way that anyone can understand and play, without having to know the intricacies of computer hacking.

White hats are hackers that aren’t malicious in their hacking. If they find vulnerabilities in someone’s code, they report it, often doing so for monetary rewards, rather than exploiting it to do damage. Black hats, by comparison, exploit vulnerabilities maliciously and use them for personal gain. The term comes from old wild west movies where the heroes wear white hats, and the villains wear black.

Capture the Flag is an event at many computer security and programming conferences and conventions. There are two types of Capture the Flag events. The most common is a Jeopardy style game where you get points for finding and patching vulnerabilities based on short clues. White Hat is based on a versus style event where each team of hackers is working against each other more directly. Each team starts with an identical computer running critical software that has a number of purposeful vulnerabilities. The goal is to find and patch those vulnerabilities. 

White Hat also has a bit of cryptocurrency as a mechanic. Cryptocurrencies are electronically generated currencies that don’t exist in a physical form. Instead, an individual wallet’s funds are stored in a digital ledger, and transactions pass between wallets update the ledger allowing users to track the movement of funds through the system. Bitcoin, the most popular cryptocurrency, is “mined” by randomly searching for a string of letters and numbers that matches the next coin to be found. White Hat uses a simplistic version of this to simulate mining cryptocurrency and using that to purchase upgrades for a player’s computer as well as additional hackers.


  • 6 player boards
  • 1 vulnerability board
  • 1 application offer board
  • 6 player screens
  • 6 cryptocurrency miner cards
  • 24 CPU tokens
  • 48 memory tokens
  • 12 GPU tokens
  • 12 end game scoring cards
  • 60 application cards
  • 100 vulnerability cards
  • 1 score sheet
  • 52 six-sided dice
    • 8 Red
    • 8 Blue
    • 8 Purple
    • 8 Green
    • 8 Yellow
    • 8 White
    • 4 Brown
  • 36 meeples
    • 6 Red
    • 6 Blue
    • 6 Purple
    • 6 Green
    • 6 Yellow
    • 6 White
  • 550 cubes
    • 48 orange cubes – CPU allocations
    • 24 light blue cubes – GPU allocations
    • 50 clear cubes – Written code
    • 50 large clear cubes – Written code x5
    • 50 yellow cubes – BTC
    • 50 large yellow cubes – BTC x5
    • 125 application cubes
      • 25 Red
      • 25 Blue
      • 25 Purple
      • 25 Green
      • 25 Pink

Also designed by Mattie Schraeder