A Reality-Stealing Website

Item #: SCP-XXXX

Object Class: Euclid

Special Containment Procedures: SCP-XXXX-1 is to be kept in office G621 with the rest of the general-purpose computers and is open for use by any personnel. Its network drives are to be unmounted and locked in such a state with the administrative password, which is only to be provided to personnel possessing level 4 security clearance. The directory tree containing SCP-XXXX is also to be secured with this password. Any potentially successful attempt made by personnel not possessing level 4 security clearance to transfer SCP-XXXX from SCP-XXXX-1 onto another computer is to be punished with termination.

SCP-XXXX-1's network drives are not to be mounted except for testing, during which, prior to mounting the drives, SCP-XXXX-1 and any variables used for testing must be locked in testing office TXXXX-01, or any other room constructed of hyperdense, perfectly light-impermeable matter if TXXXX-01 is unavailable, and recorded with a standard video camera. After mounting the devices and activating the video camera, all testing personnel should leave the room within four minutes, preferably immediately. After leaving the room, the personnel should wait for at least 3 hours 55 minutes before reentering, and should immediately unmount the network drives before retrieving the video camera. On semi-rare occassions the personnel may find the video camera to have been consumed by SCP-XXXX. No procedures have proven effective to prevent this phenomenon without also preventing any footage from being filmed.

SCP-XXXX-1 is to be replaced 1 year before its estimated date of expiration. Whenever it is replaced, the old model of SCP-XXXX-1 is to be neutralized, preferably through an information-irreversible process if such means is available, and SCP-XXXX is to be transmitted to the new model via a physical storage medium, such as a compact disk or external drive. Once transmission is complete, the storage medium used is to be neutralized, also preferably through an information-irreversible process if such means is available.

Description: SCP-XXXX is a series of digital documents. Any computer storing SCP-XXXX is referred to as SCP-XXXX-1. The first instance of SCP-XXXX-1 was found in Dallas, Texas with global IP address and has since been neutralized and suitably replaced. The present instance is located at Sector-07 in [REDACTED] with global IP address [REDACTED]. A decoy has been set up with global IP address whose data is functionally equivalent to SCP-XXXX but does not exhibit its anomalous properties. SCP-XXXX's pages report that it is a science fiction website which members may freely edit. Packets sent and received by SCP-XXXX-1 during normal function support this claim.

SCP-XXXX's anomalous properties manifest when SCP-XXXX-1 is network-enabled and exposed to any object possessing anomalous properties of its own, henceforth designated SCP-XXXX-2. Radius of exposure has yet to be identified and appears to be limited only by whether or not any medium of travel of light exists between SCP-XXXX-1 and SCP-XXXX-2. In 30% of cases when anomalous objects are available, and in 100% of cases when no anomalous objects are available, SCP-XXXX will select a mundane object instead of an anomalous one. Recorded mundane instances of SCP-XXXX-2 include a bag of generic potato chips, documents regarding SCP-███, 16 mechanical pencils, and 1 D-class personnel (see Incident Report XXXX-03).

Once SCP-XXXX has identified SCP-XXXX-2, SCP-XXXX-1 will spontaneously open a word processor and begin printing a description of SCP-XXXX-2 to the word processor's input stream at approximately 6 characters per second on average. The description will include an arbitrary classification of the object, its properties, and protocol to observe when handling it. Each property stated by SCP-XXXX-1 will immediately disappear from SCP-XXXX-2; for instance, once SCP-XXXX-1 has described a spherical object as round, the object will immediately exhibit a quantum-probabilistic shape; once SCP-XXXX-1 has recorded that this object is blue, it will immediately become a perfectly black body. If SCP-XXXX-1 is describing a mundane object, it will fabricate anomalous properties for it. SCP-XXXX-1 will continue to describe SCP-XXXX-2 until it no longer possesses any physical information and consequently ceases to exist. Attempts made to terminate the word processor during this process have proven successful, but have in 3 of 4 cases resulted in [REDACTED]nerally considered preferable to allow SCP-XXXX to consume SCP-XXXX-2 completely.

Once SCP-XXXX has completed the description of SCP-XXXX-2, it will save it to an HTML file in a directory inside the root directory. Each HTML file is equipped with a server-side include at the top of the page, which references a nonsense address and appears ineffectual (see Addendum XXXX-06). As long as the network drives are still mounted, this HTML file will be accessible to other computers. The file includes a mechanism for assigning it a subjective binary assessment of quality and a mechanism for typing one's views of the story and saving them to the server. Occasionally, a member of the website, henceforth designated SCP-XXXX-3, will claim authorship of the page. Contact was established with 47 instances of SCP-XXXX-3 that proved they are real people and not fabrications of SCP-XXXX. They were subjected to brief psychological tests that proved they believed they were telling the truth. No two subjects reported authorship of the same page. Personal information and DNA samples were taken from each subject for future reference. It is currently unknown whether their claims of authorship are accurate; heavy network activity can be observed while SCP-XXXX-1 is writing the description of SCP-XXXX-2, but the packets sent and received at this time cannot be read by any known means, including direct analysis of the hard disk. It is also unknown how SCP-XXXX-1 could engage in network activity with any other computer during testing, as it is only tested in perfectly light-impermeable rooms.

Addendum XXXX-01:

Test Log XXXX-02:

Addendum XXXX-03:

Incident Report XXXX-04:

Test Log XXXX-05:

Addendum XXXX-06: