I Use This!
Analyzed 1 day ago. based on code collected 1 day ago.

Project Summary

TONG is a desceptively simple-looking game that combines the popular and oft-cloned games Tetris and Pong played in the same space at the same time. Pong paddles surround some or all sides of a tetris playfield, and all the action happens within. The main attration, however, is the customizable set of rules that explain how tetris and pong elements interact. For example, when the game starts, if a pong ball collides with a tetrad, it might bounce off, rotate the tetrad, and increase your score. Later, after a few random- or time-based rule changes (which, according to themselves, might be prominently displayed or completely secret) the ball would stick to the tetrad, changing its shape, and have a negative effect on the player's score. Constantly mixing up the chemistry between tetris and pong elements (Does the ball break away the stack at the bottom? Upon impact, does the ball split in two and the tetrad get instantly pushed down?) is the key feature of the game, and what sets it apart from other spin-offs. Two main versions will be developed (and any others that people may create building off of these) - a single-player game meant to be played primarily on a desktop computer, and a side-by-side four-player game suitable for arcade-type booths or game consoles.


2d c++ game pong tetris-like

In a Nutshell, TONG...

GNU General Public License v2.0 or later

Commercial Use



Place Warranty



Hold Liable


Distribute Original

Disclose Source

Include Copyright

State Changes

Include License

These details are provided for information only. No information here is legal advice and should not be used as such.

Project Security

Vulnerabilities per Version ( last 10 releases )

There are no reported vulnerabilities

Project Vulnerability Report

Security Confidence Index

Poor security track-record
Favorable security track-record

Vulnerability Exposure Index

Many reported vulnerabilities
Few reported vulnerabilities

Did You Know...

  • ...
    65% of companies leverage OSS to speed application development in 2016
  • ...
    by exploring contributors within projects, you can view details on every commit they have made to that project
  • ...
    nearly 1 in 3 companies have no process for identifying, tracking, or remediating known open source vulnerabilities
  • ...
    search using multiple tags to find exactly what you need
About Project Security


2 Other

30 Day Summary

Dec 31 2022 — Jan 30 2023

12 Month Summary

Jan 30 2022 — Jan 30 2023


Be the first to rate this project
Click to add your rating
Review this Project!