[{"data":1,"prerenderedAt":450},["ShallowReactive",2],{"navigation_docs":3,"-advanced-checkpoint-recovery":125,"-advanced-checkpoint-recovery-surround":445},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":110,"body":127,"description":438,"extension":439,"links":440,"meta":441,"navigation":442,"path":111,"seo":443,"stem":112,"__hash__":444},"docs/5.advanced/checkpoint-recovery.md",{"type":128,"value":129,"toc":425},"minimark",[130,134,138,143,151,161,164,199,203,206,211,217,221,224,235,239,242,261,265,272,276,282,287,302,306,309,329,333,342,350,354,360,407,410,421],[131,132,110],"h1",{"id":133},"checkpoint-recovery",[135,136,137],"p",{},"Heists can be interrupted — your AI session might time out, you might need to step away, or a technical issue might cut things short. Gangsta's checkpoint system ensures you never lose progress.",[139,140,142],"h2",{"id":141},"how-checkpoints-work","How Checkpoints Work",[135,144,145,146,150],{},"Every phase of the Heist writes checkpoints to ",[147,148,149],"code",{},"docs/gangsta/",":",[152,153,158],"pre",{"className":154,"code":156,"language":157},[155],"language-text","docs/gangsta/{heist-name}/\n├── checkpoints/\n│   ├── 01-reconnaissance.md\n│   ├── 02-the-grilling.md\n│   ├── 03-the-sit-down.md\n│   ├── 04-resource-development.md\n│   └── 05-the-hit.md\n├── recon/\n│   └── 2026-04-15-recon-dossier.md\n├── specs/\n│   └── 2026-04-15-contract.md\n└── plans/\n    └── 2026-04-15-war-plan.md\n","text",[147,159,156],{"__ignoreMap":160},"",[135,162,163],{},"Each checkpoint records:",[165,166,167,175,181,187,193],"ul",{},[168,169,170,174],"li",{},[171,172,173],"strong",{},"Phase completed"," — Which phase just finished",[168,176,177,180],{},[171,178,179],{},"Gate status"," — Whether the Don approved",[168,182,183,186],{},[171,184,185],{},"Key decisions"," — Major choices made during the phase",[168,188,189,192],{},[171,190,191],{},"Artifacts produced"," — Dossier, Contract, War Plan, etc.",[168,194,195,198],{},[171,196,197],{},"Pending items"," — Anything unresolved",[139,200,202],{"id":201},"resuming-an-interrupted-heist","Resuming an Interrupted Heist",[135,204,205],{},"When you start a new session after an interruption:",[207,208,210],"h3",{"id":209},"step-1-check-for-checkpoints","Step 1: Check for Checkpoints",[135,212,213,214,216],{},"Look in ",[147,215,149],{}," for heist directories with checkpoint files.",[207,218,220],{"id":219},"step-2-read-the-latest-checkpoint","Step 2: Read the Latest Checkpoint",[135,222,223],{},"The checkpoint tells you:",[165,225,226,229,232],{},[168,227,228],{},"Which phase was last completed",[168,230,231],{},"What artifacts were produced",[168,233,234],{},"Any pending decisions",[207,236,238],{"id":237},"step-3-present-context-to-the-don","Step 3: Present Context to the Don",[135,240,241],{},"Start your new session by:",[243,244,245],"blockquote",{},[135,246,247,248,252,253,256,257,260],{},"\"I'm resuming a Heist that was interrupted. The last completed phase was ",[249,250,251],"span",{},"Phase X",". Here's the context: ",[249,254,255],{},"summary of checkpoint",". Should we continue from ",[249,258,259],{},"Phase X+1","?\"",[207,262,264],{"id":263},"step-4-continue-from-the-last-approved-phase","Step 4: Continue from the Last Approved Phase",[135,266,267,268,271],{},"Resume from the phase after the last ",[171,269,270],{},"approved"," checkpoint. If the last phase was completed but not approved, present the output for Don review before proceeding.",[139,273,275],{"id":274},"example-interrupted-during-the-hit","Example: Interrupted During The Hit",[152,277,280],{"className":278,"code":279,"language":157},[155],"docs/gangsta/notifications/\n├── checkpoints/\n│   ├── 01-reconnaissance.md  ← approved\n│   ├── 02-the-grilling.md    ← approved\n│   ├── 03-the-sit-down.md    ← approved\n│   ├── 04-resource-development.md  ← approved\n│   └── 05-the-hit.md         ← INCOMPLETE\n├── recon/\n│   └── 2026-04-15-recon-dossier.md\n├── specs/\n│   └── 2026-04-15-contract.md\n└── plans/\n    └── 2026-04-15-war-plan.md\n",[147,281,279],{"__ignoreMap":160},[135,283,284],{},[171,285,286],{},"Resume approach:",[288,289,290,293,296,299],"ol",{},[168,291,292],{},"Read all checkpoints to understand the full context",[168,294,295],{},"Read the War Plan to see which tasks were assigned",[168,297,298],{},"Check the incomplete The Hit checkpoint for partial progress",[168,300,301],{},"Resume The Hit from where it left off, or restart if the partial work is unclear",[139,303,305],{"id":304},"example-clean-resume-after-laundering","Example: Clean Resume After Laundering",[135,307,308],{},"If the Heist completed successfully and you want to build something new:",[288,310,311,314,320,326],{},[168,312,313],{},"The previous Heist's Ledger entries are preserved",[168,315,316,317],{},"Start a new Heist with ",[147,318,319],{},"gangsta:reconnaissance",[168,321,322,323,325],{},"The agent will read ",[147,324,149],{}," for context and institutional memory",[168,327,328],{},"Previous insights and fails inform the new Heist",[139,330,332],{"id":331},"best-practices","Best Practices",[334,335,338,341],"callout",{"icon":336,"type":337},"i-lucide-save","info",[171,339,340],{},"Checkpoint frequently:"," The more granular your checkpoints, the easier it is to resume. The Heist Pipeline creates natural checkpoints at every phase gate.",[334,343,346,349],{"icon":344,"type":345},"i-lucide-alert-triangle","warning",[171,347,348],{},"Don't skip phases on resume."," Even if you're confident about where you left off, read the checkpoints. Context can be subtly different from what you remember, and the Rule of Truth (Omerta Law #3) requires citing sources — checkpoints are your sources.",[139,351,353],{"id":352},"checkpoint-and-git","Checkpoint and Git",[135,355,356,357,359],{},"Checkpoints are files in ",[147,358,149],{}," — they should be committed to version control:",[152,361,365],{"className":362,"code":363,"language":364,"meta":160,"style":160},"language-bash shiki shiki-themes material-theme-lighter material-theme material-theme-palenight","# After each phase gate\ngit add docs/gangsta/\ngit commit -m \"heist: phase N checkpoint — [phase name]\"\n","bash",[147,366,367,374,387],{"__ignoreMap":160},[249,368,370],{"class":369,"line":11},"line",[249,371,373],{"class":372},"sHwdD","# After each phase gate\n",[249,375,376,380,384],{"class":369,"line":16},[249,377,379],{"class":378},"sBMFI","git",[249,381,383],{"class":382},"sfazB"," add",[249,385,386],{"class":382}," docs/gangsta/\n",[249,388,389,391,394,397,401,404],{"class":369,"line":21},[249,390,379],{"class":378},[249,392,393],{"class":382}," commit",[249,395,396],{"class":382}," -m",[249,398,400],{"class":399},"sMK4o"," \"",[249,402,403],{"class":382},"heist: phase N checkpoint — [phase name]",[249,405,406],{"class":399},"\"\n",[135,408,409],{},"This ensures:",[165,411,412,415,418],{},[168,413,414],{},"Checkpoints survive across sessions",[168,416,417],{},"The team can see Heist progress",[168,419,420],{},"History is preserved even if the local environment changes",[422,423,424],"style",{},"html pre.shiki code .sHwdD, html code.shiki .sHwdD{--shiki-light:#90A4AE;--shiki-light-font-style:italic;--shiki-default:#546E7A;--shiki-default-font-style:italic;--shiki-dark:#676E95;--shiki-dark-font-style:italic}html pre.shiki code .sBMFI, html code.shiki .sBMFI{--shiki-light:#E2931D;--shiki-default:#FFCB6B;--shiki-dark:#FFCB6B}html pre.shiki code .sfazB, html code.shiki .sfazB{--shiki-light:#91B859;--shiki-default:#C3E88D;--shiki-dark:#C3E88D}html pre.shiki code .sMK4o, html code.shiki .sMK4o{--shiki-light:#39ADB5;--shiki-default:#89DDFF;--shiki-dark:#89DDFF}html .light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html.light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":160,"searchDepth":16,"depth":16,"links":426},[427,428,434,435,436,437],{"id":141,"depth":16,"text":142},{"id":201,"depth":16,"text":202,"children":429},[430,431,432,433],{"id":209,"depth":21,"text":210},{"id":219,"depth":21,"text":220},{"id":237,"depth":21,"text":238},{"id":263,"depth":21,"text":264},{"id":274,"depth":16,"text":275},{"id":304,"depth":16,"text":305},{"id":331,"depth":16,"text":332},{"id":352,"depth":16,"text":353},"How to resume interrupted Heists from checkpoint files.","md",null,{},{"order":26},{"title":110,"description":438},"5DShBlVs_4ZJrwcCDBS5lBfsT5zHJd-saJs10srq98c",[446,448],{"title":107,"path":103,"stem":108,"description":447,"order":11,"children":-1},"Custom skills, multi-agent patterns, checkpoint recovery, and contributing to Gangsta.",{"title":114,"path":115,"stem":116,"description":449,"order":38,"children":-1},"How to contribute skills to the Gangsta framework.",1776282626914]