[{"data":1,"prerenderedAt":510},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-intent-routing":125,"-core-concepts-intent-routing-surround":505},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":35,"body":127,"description":498,"extension":499,"links":500,"meta":501,"navigation":502,"path":36,"seo":503,"stem":37,"__hash__":504},"docs/2.core-concepts/intent-routing.md",{"type":128,"value":129,"toc":488},"minimark",[130,134,138,143,288,292,295,374,378,381,386,389,407,411,414,427,431,439,471,475,485],[131,132,35],"h1",{"id":133},"intent-routing",[135,136,137],"p",{},"When you speak, the agent analyzes your intent and routes it to the appropriate Gangsta skill. This routing is automatic — powered by the 1% Rule — but understanding the mapping helps you work more effectively.",[139,140,142],"h2",{"id":141},"intent-skill-mapping","Intent → Skill Mapping",[144,145,146,162],"table",{},[147,148,149],"thead",{},[150,151,152,156,159],"tr",{},[153,154,155],"th",{},"User Intent",[153,157,158],{},"Action",[153,160,161],{},"Skill Invoked",[163,164,165,183,198,213,230,243,258,273],"tbody",{},[150,166,167,174,177],{},[168,169,170],"td",{},[171,172,173],"strong",{},"Build something new",[168,175,176],{},"Start a Heist",[168,178,179],{},[180,181,182],"code",{},"gangsta:reconnaissance",[150,184,185,190,193],{},[168,186,187],{},[171,188,189],{},"Fix a bug or issue",[168,191,192],{},"Get diagnosis first",[168,194,195],{},[180,196,197],{},"gangsta:the-consigliere",[150,199,200,205,208],{},[168,201,202],{},[171,203,204],{},"Debug a problem",[168,206,207],{},"Systematic root-cause analysis",[168,209,210],{},[180,211,212],{},"gangsta:interrogation-debugging",[150,214,215,220,223],{},[168,216,217],{},[171,218,219],{},"Continue existing work",[168,221,222],{},"Resume from checkpoint",[168,224,225,226,229],{},"Check ",[180,227,228],{},"docs/gangsta/"," for files",[150,231,232,237,240],{},[168,233,234],{},[171,235,236],{},"Ask a question",[168,238,239],{},"Answer directly",[168,241,242],{},"No skill needed",[150,244,245,250,253],{},[168,246,247],{},[171,248,249],{},"Review or audit",[168,251,252],{},"Structured assessment",[168,254,255],{},[180,256,257],{},"gangsta:audit-review",[150,259,260,265,268],{},[168,261,262],{},[171,263,264],{},"Write tests first",[168,266,267],{},"TDD cycle",[168,269,270],{},[180,271,272],{},"gangsta:drill-tdd",[150,274,275,280,283],{},[168,276,277],{},[171,278,279],{},"Process feedback",[168,281,282],{},"Rigorous review",[168,284,285],{},[180,286,287],{},"gangsta:receiving-orders",[139,289,291],{"id":290},"skill-priority","Skill Priority",[135,293,294],{},"When multiple skills could apply, routing follows this order:",[296,297,298,329,352],"ol",{},[299,300,301,304,305,308,309,308,312,315],"li",{},[171,302,303],{},"Process skills first"," — ",[180,306,307],{},"reconnaissance",", ",[180,310,311],{},"interrogation-debugging",[180,313,314],{},"drill-tdd",[316,317,318,326],"ul",{},[299,319,320,321,325],{},"These determine ",[322,323,324],"em",{},"how"," to approach the task",[299,327,328],{},"They set up the methodology before any work begins",[299,330,331,304,334,308,337,340],{},[171,332,333],{},"Orchestration skills second",[180,335,336],{},"the-underboss",[180,338,339],{},"the-capo",[316,341,342,349],{},[299,343,344,345,348],{},"These manage ",[322,346,347],{},"who"," does what",[299,350,351],{},"They decompose work after the approach is established",[299,353,354,304,357,308,360,363],{},[171,355,356],{},"Implementation skills third",[180,358,359],{},"the-hit",[180,361,362],{},"resource-development",[316,364,365,371],{},[299,366,367,368],{},"These guide ",[322,369,370],{},"execution",[299,372,373],{},"They operate within the structure established by process skills",[139,375,377],{"id":376},"skill-types","Skill Types",[135,379,380],{},"Skills come in two flavors:",[382,383,385],"h3",{"id":384},"rigid-skills","Rigid Skills",[135,387,388],{},"Must be followed exactly. Don't adapt away from the discipline.",[316,390,391,396,401],{},[299,392,393,395],{},[180,394,272],{}," — Red-Green-Refactor, no shortcuts",[299,397,398,400],{},[180,399,212],{}," — Systematic root-cause, no guessing",[299,402,403,406],{},[180,404,405],{},"gangsta:omerta"," — Laws apply always, no exceptions",[382,408,410],{"id":409},"flexible-skills","Flexible Skills",[135,412,413],{},"Adapt principles to context. The spirit matters more than the letter.",[316,415,416,421],{},[299,417,418,420],{},[180,419,182],{}," — Intel gathering adapts to codebase size",[299,422,423,426],{},[180,424,425],{},"gangsta:the-grilling"," — Debate depth adapts to feature complexity",[139,428,430],{"id":429},"common-routing-mistakes","Common Routing Mistakes",[432,433,436],"callout",{"icon":434,"type":435},"i-lucide-alert-triangle","danger",[171,437,438],{},"Anti-patterns to avoid:",[296,440,441,450,459,465],{},[299,442,443,446,447,449],{},[171,444,445],{},"Skipping reconnaissance"," — \"I already know the codebase\" → You probably don't know it as well as a systematic scan. Invoke ",[180,448,182],{},".",[299,451,452,455,456,458],{},[171,453,454],{},"Debugging without structure"," — \"Let me just try changing this line\" → Use ",[180,457,212],{}," for systematic root-cause analysis.",[299,460,461,464],{},[171,462,463],{},"Coding without a spec"," — \"I'll just start implementing\" → This violates Omerta Law #5 (Spec is Law). Run a Heist first.",[299,466,467,470],{},[171,468,469],{},"Auto-advancing phases"," — \"The dossier looks fine, let's keep going\" → Every phase gate requires explicit Don approval. No auto-advancing.",[139,472,474],{"id":473},"the-flow-in-practice","The Flow in Practice",[476,477,482],"pre",{"className":478,"code":480,"language":481},[479],"language-text","User says \"I want to add notifications\"\n  └── Intent: Build something new\n       └── Skill: gangsta:reconnaissance\n            └── Don approves Dossier\n                 └── gangsta:the-grilling\n                      └── Don approves Consensus\n                           └── gangsta:the-sit-down\n                                └── Don signs Contract\n                                     └── gangsta:resource-development\n                                          └── Don approves War Plan\n                                               └── gangsta:the-hit\n                                                    └── Don approves Completion\n                                                         └── gangsta:laundering\n                                                              └── Don declares Complete\n","text",[180,483,480],{"__ignoreMap":484},"",[135,486,487],{},"Each arrow represents a phase gate — a point where you must explicitly approve before proceeding.",{"title":484,"searchDepth":16,"depth":16,"links":489},[490,491,492,496,497],{"id":141,"depth":16,"text":142},{"id":290,"depth":16,"text":291},{"id":376,"depth":16,"text":377,"children":493},[494,495],{"id":384,"depth":21,"text":385},{"id":409,"depth":21,"text":410},{"id":429,"depth":16,"text":430},{"id":473,"depth":16,"text":474},"How Gangsta maps user intent to the right skill invocation.","md",null,{},{"order":38},{"title":35,"description":498},"109i8a2gF4xRfEtu9TsPcxtrfjEd5hXYnPFLQETYa1M",[506,508],{"title":29,"path":30,"stem":31,"description":507,"order":11,"children":-1},"The foundational ideas behind Gangsta — the hierarchy, the pipeline, the laws, and the philosophy.",{"title":40,"path":41,"stem":42,"description":509,"order":26,"children":-1},"The five governance laws that prevent chaos in AI-assisted development.",1776282626913]