What is the logic behind Rogue sneak attacks working off of adjacency?

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.