[{"data":1,"prerenderedAt":390},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-omerta":125,"-core-concepts-omerta-surround":385},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":40,"body":127,"description":378,"extension":379,"links":380,"meta":381,"navigation":382,"path":41,"seo":383,"stem":42,"__hash__":384},"docs/2.core-concepts/omerta.md",{"type":128,"value":129,"toc":369},"minimark",[130,134,138,149,154,160,163,168,184,188,193,196,200,211,215,220,227,231,242,246,251,254,258,269,273,278,281,285,299,303,306,366],[131,132,40],"h1",{"id":133},"omerta-the-five-laws",[135,136,137],"p",{},"Omerta is the code of silence — and in Gangsta, it's the code of governance. Five laws that prevent the chaos typical of undisciplined AI-assisted development.",[139,140,143,144,148],"callout",{"icon":141,"type":142},"i-lucide-scale","warning","These laws are always active. They're invoked via ",[145,146,147],"code",{},"gangsta:omerta"," and govern every phase of every Heist.",[150,151,153],"h2",{"id":152},"law-1-the-introduction-rule","Law 1: The Introduction Rule",[135,155,156],{},[157,158,159],"strong",{},"No direct agent-to-agent communication.",[135,161,162],{},"Agents never talk to each other directly. All communication flows through files — checkpoints, contracts, war plans. This prevents the \"telephone game\" problem where messages get distorted through chains of agents.",[135,164,165],{},[157,166,167],{},"In practice:",[169,170,171,175,178],"ul",{},[172,173,174],"li",{},"Soldiers don't message other Soldiers",[172,176,177],{},"Capos don't message other Capos",[172,179,180,181],{},"All coordination happens through shared files in ",[145,182,183],{},"docs/gangsta/",[150,185,187],{"id":186},"law-2-the-rule-of-availability","Law 2: The Rule of Availability",[135,189,190],{},[157,191,192],{},"Every state must be checkpointed to files.",[135,194,195],{},"No agent holds critical state in memory. Everything is written to disk so any agent can pick up where another left off. This is what makes Heist resumption possible.",[135,197,198],{},[157,199,167],{},[169,201,202,205,208],{},[172,203,204],{},"Dossiers, Contracts, War Plans — all persisted as files",[172,206,207],{},"Checkpoints written after every phase",[172,209,210],{},"Any new session can reconstruct the full state from files",[150,212,214],{"id":213},"law-3-the-rule-of-truth","Law 3: The Rule of Truth",[135,216,217],{},[157,218,219],{},"Every claim must cite its source.",[135,221,222,223,226],{},"Agents must reference where they found information. No \"I think the database uses PostgreSQL\" — instead: \"The database config in ",[145,224,225],{},"config/database.yml"," line 42 shows PostgreSQL.\" This prevents hallucination from propagating.",[135,228,229],{},[157,230,167],{},[169,232,233,236,239],{},[172,234,235],{},"File paths and line numbers for code claims",[172,237,238],{},"URLs for documentation claims",[172,240,241],{},"\"I don't know\" is acceptable; guessing is not",[150,243,245],{"id":244},"law-4-the-rule-of-tribute","Law 4: The Rule of Tribute",[135,247,248],{},[157,249,250],{},"Resource budgets are tracked.",[135,252,253],{},"Every task allocated to a Soldier has a tribute (budget) — estimated time or token cost. Tributes are tracked during The Hit to prevent runaway tasks. If a task exceeds its tribute, it must request an extension.",[135,255,256],{},[157,257,167],{},[169,259,260,263,266],{},[172,261,262],{},"War Plans include tribute estimates per task",[172,264,265],{},"Soldiers report tribute consumption during execution",[172,267,268],{},"Over-budget tasks raise a flag for Don review",[150,270,272],{"id":271},"law-5-spec-is-law","Law 5: Spec is Law",[135,274,275],{},[157,276,277],{},"If code contradicts the spec, revise the spec — not the code.",[135,279,280],{},"This is the philosophical foundation. The Contract (spec) is the authoritative source of truth. If implementation reveals a spec issue, the spec is formally revised. Code is never the primary artifact — the spec is.",[135,282,283],{},[157,284,167],{},[169,286,287,290,293,296],{},[172,288,289],{},"The Sit-Down produces the Contract",[172,291,292],{},"The Hit implements the Contract",[172,294,295],{},"Deviations require a Contract amendment, not a code-first approach",[172,297,298],{},"This ensures consistency and auditability",[150,300,302],{"id":301},"why-these-laws-matter","Why These Laws Matter",[135,304,305],{},"Without Omerta, AI-assisted development degenerates:",[307,308,309,322],"table",{},[310,311,312],"thead",{},[313,314,315,319],"tr",{},[316,317,318],"th",{},"Problem",[316,320,321],{},"Law That Prevents It",[323,324,325,334,342,350,358],"tbody",{},[313,326,327,331],{},[328,329,330],"td",{},"Agents contradict each other",[328,332,333],{},"Introduction Rule",[313,335,336,339],{},[328,337,338],{},"Lost context across sessions",[328,340,341],{},"Rule of Availability",[313,343,344,347],{},[328,345,346],{},"Hallucinated facts propagated",[328,348,349],{},"Rule of Truth",[313,351,352,355],{},[328,353,354],{},"Runaway tasks consuming resources",[328,356,357],{},"Rule of Tribute",[313,359,360,363],{},[328,361,362],{},"Code drifting from requirements",[328,364,365],{},"Spec is Law",[135,367,368],{},"These laws aren't bureaucratic overhead — they're the guardrails that make AI-assisted development reliable and repeatable.",{"title":370,"searchDepth":16,"depth":16,"links":371},"",[372,373,374,375,376,377],{"id":152,"depth":16,"text":153},{"id":186,"depth":16,"text":187},{"id":213,"depth":16,"text":214},{"id":244,"depth":16,"text":245},{"id":271,"depth":16,"text":272},{"id":301,"depth":16,"text":302},"The five governance laws that prevent chaos in AI-assisted development.","md",null,{},{"order":26},{"title":40,"description":378},"hW45ChHsZBYnqGsS5hx5FdRcymvpF5JssZDgw5wVQT8",[386,388],{"title":35,"path":36,"stem":37,"description":387,"order":38,"children":-1},"How Gangsta maps user intent to the right skill invocation.",{"title":44,"path":45,"stem":46,"description":389,"order":47,"children":-1},"The philosophy at the core of Gangsta — spec is law, code is implementation.",1776282625801]