All Fiction Battles Wiki
All Fiction Battles Wiki

Summary

The ability to create forcefields or barriers to shield the user or their allies from incorporeal, energy, or physical attacks. Characters have the ability to employ forcefields/barriers in different ways, such as opening them up inside of their enemies to kill them, trapping them inside the barrier so they can be crushed within it, or even containing incorporeal beings. Forcefields can also be used to contain explosions, move objects/people around, and can be used to attack people in various ways, such as forcefield blasts.

Additionally, some characters have the power to surround themselves with a soundproof barrier so that no one can hear them. Forcefields can also be utilised to create constructs, such as platforms to move on in mid-air, and deflect or reflect specific types of attacks.

Advanced technology, telekinesis, magic, energy manipulation/projection, and matter manipulation can all be used to create forcefields.

Limitations

  • Despite how effective forcefields are, some durability-negating assaults are likely to ignore them.
  • Forcefields may become unusable as a result of some energy manipulation attacks. That, though, is dependent on the user's power and/or verse mechanisms.
  • If a character has higher attack/destructive potency than a forcefield user, then it is possible for them to destroy and overpower this ability.
  • Depending on the verse, forcefields can require a tremendous amount of concentration, time, and power to create and use.
    • Furthermore, some characters would only be able to create and use one barrier at a time, whereas others would be able to create and use multiple barricades at the same time. This can also depend on how powerful the forcefield is.
  • Certain barriers will only be able to stop specific types of attacks. For example;
    • Most forcefields are capable of stopping physical projectiles, but they may be ineffective against energy attacks.
    • Certain forcefields only block magical attacks, while other types of attacks pass through them.

Notable Users