trust

Security

How Obelisk handles Scribe access, credentials, isolation, auditability, and operational security.

Each Scribe is managed as its own operating boundary in Obelisk. Access is scoped to the organization that owns it.

Credentials are stored through Obelisk's credential system and exposed to the Scribe only for the work it is assigned.

Tasks, conversations, work spans, and generated artifacts create a reviewable trail of what happened.

Sensitive work should keep approval steps in the standing orders. A Scribe can pause and ask for input when it reaches a boundary.

Need a document or review?

Send the request through support with your organization, requested document, and review timeline.

Contact support