[{"data":1,"prerenderedAt":201},["ShallowReactive",2],{"navigation_docs":3,"-advanced":125,"-advanced-surround":196},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":107,"body":127,"description":189,"extension":190,"links":191,"meta":192,"navigation":193,"path":103,"seo":194,"stem":108,"__hash__":195},"docs/5.advanced/index.md",{"type":128,"value":129,"toc":186},"minimark",[130,134,138,172],[131,132,107],"h1",{"id":133},"advanced-topics",[135,136,137],"p",{},"For users who have mastered the basics and want to go deeper:",[139,140,141,151,158,165],"ul",{},[142,143,144,150],"li",{},[145,146,147],"strong",{},[148,149,118],"a",{"href":119}," — Create your own Gangsta skills using the SKILL.md format",[142,152,153,157],{},[145,154,155],{},[148,156,122],{"href":123}," — Use Underboss for task decomposition, Capo for territory orchestration",[142,159,160,164],{},[145,161,162],{},[148,163,110],{"href":111}," — Resume interrupted Heists from checkpoint files",[142,166,167,171],{},[145,168,169],{},[148,170,114],{"href":115}," — How to contribute skills to the Gangsta framework",[173,174,176,179,180,182,183,185],"callout",{"icon":102,"type":175},"info",[145,177,178],{},"Prerequisites:"," Make sure you've read ",[148,181,29],{"href":30}," and understand the ",[148,184,63],{"href":65}," before diving into advanced topics.",{"title":187,"searchDepth":16,"depth":16,"links":188},"",[],"Custom skills, multi-agent patterns, checkpoint recovery, and contributing to Gangsta.","md",null,{},{"order":11},{"title":107,"description":189},"7iKbyjRVV_6ZiZa14z74UJCvWJjgaXg64pnz3WPuZPY",[197,199],{"title":95,"path":96,"stem":97,"description":198,"children":-1},"All 20 battle-tested Gangsta skills — each a pure markdown file that can be installed to any AI agent platform.",{"title":110,"path":111,"stem":112,"description":200,"order":26,"children":-1},"How to resume interrupted Heists from checkpoint files.",1776282626914]