GuiltHaunt [collab with nico]

The inside of SCP-XX. SCP-XX-A is approaching out of frame.1

Item #: SCP-XXXX

Object Class: Safe-doctrina2

Special Containment Procedures: A cover story that SCP-XXXX is an art installation designed to never be opened has been implemented. Civilians attempting to tamper with SCP-XXXX are to be apprehended and removed from the premises.

As of Incident XXXX, testing using unmanned drones has been put on hold until further notice.

Description: SCP-XXXX is a large tombstone with a wooden door installed on its surface. The letters "rip" are crudely carved onto the wood. Several tests have revealed that SCP-XXXX itself has no inside, and is entirely made out of concrete. SCP-XXXX's door contains an extradimensional space, referred to as SCP-XXXX-1. Only one person is able to enter SCP-XXXX-1 at a time.3

SCP-XXXX-1 is a monochromatic landscape with the appearance of a graveyard including fences, tombstones, and mausoleums. The layout of SCP-XXXX-1 is reportedly unique to each individual entering it, as is the architecture of any structures present within. The structures are usually places that the subject recognizes, such as their childhood home, place of work, etc.


Example of an SCP-XXXX-1 structure.

When entered, SCP-XXXX-1 manifests a humanoid entity, identified as SCP-XXXX-A. The entity manifested possesses a similar appearance (with notable lack of pigmentation in the skin as well as the presence of several wounds) to that of the subject introduced to SCP-XXXX. SCP-XXXX-A seems to have some level of control over SCP-XXXX-1, and is able to manipulate the appearance of the area to a degree. Such behaviors were observed in Exploration Logs 1 and 2.

SCP-XXXX-A usually stalks the subject before introducing themselves. SCP-XXXX-A seems to be under the belief that their identity is of the person who entered. SCP-XXXX-A will act as a guide throughout SCP-XXXX-1. SCP-XXXX-A will also attempt to persuade people to stay, using any means necessary to keep the person inside of SCP-XXXX-1 for as long as possible. See Exploration Log 1 and 2 for examples of this behavior below.

to do list:
1. figure out how to get the incident log to hit hard (give a little description, a data expunged, and then the pic and audio log)
2. write those exploration logs
3. seek criticism for the descriptions and containment procedures

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License