Thanks. I hadn't seen it.
You should read this Post (RAW vs RACS, Rules As Common Sense)
"I thought that I had seen a Range limit to the sneak attack with the Ranged Weapon, 30 feet"
Read more: http://www.enworld.org/forum/showth...-with-the-Ranged-Weapon-30-feet#ixzz3S30w0qsB
Cannon, not canon.
I was just thinking of the same thing, and the whole siege weapon sneak attack made me understand how the rules as fun part is going to most likely work.
Siege weapons are ranged weapon attacks, sneak attack can be applied to ranged attacks.
RAW: You can sneak attack with a trebuchet or ballista.
RAI: I imagine they didn't consider people sneak attacking with siege weapons, so the intent is probably you shouldn't be able to.
RAF: I like the idea of Bard from the last hobbit movie, sneak attacking with that ballista, or a rogue using a cannon to hit a tarrasque in the knee, so in this case under most situations I think the RAW works fine and my players can sneak attack with siege weapons just fine.
EDIT: Fixed spelling error.
I was just thinking of the same thing, and the whole siege weapon sneak attack made me understand how the rules as fun part is going to most likely work.
Siege weapons are ranged weapon attacks, sneak attack can be applied to ranged attacks.
RAW: You can sneak attack with a trebuchet or ballista.
RAI: I imagine they didn't consider people sneak attacking with siege weapons, so the intent is probably you shouldn't be able to.
RAF: I like the idea of Bard from the last hobbit movie, sneak attacking with that ballista, or a rogue using a cannon to hit a tarrasque in the knee, so in this case under most situations I think the RAW works fine and my players can sneak attack with siege weapons just fine.
EDIT: Fixed spelling error.
I don't really think this is true.every clearly written rule has a loophole, someone can exploit.
I don't really think this is true.
I can think of clear RPG rules that don't have exploitable loopholes. The rules for rolling to hit in D&D have always been pretty clear, and don't seem to involve exploitable loopholes.