[{"data":1,"prerenderedAt":499},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-spec-driven-dev":125,"-core-concepts-spec-driven-dev-surround":494},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":44,"body":127,"description":487,"extension":488,"links":489,"meta":490,"navigation":491,"path":45,"seo":492,"stem":46,"__hash__":493},"docs/2.core-concepts/spec-driven-dev.md",{"type":128,"value":129,"toc":478},"minimark",[130,134,142,148,153,156,178,185,189,192,276,283,298,302,305,349,352,370,373,377,423,427,430,439,442,446],[131,132,44],"h1",{"id":133},"spec-driven-development",[135,136,137,141],"p",{},[138,139,140],"strong",{},"Spec is Law."," This is Omerta Law #5 and the philosophical foundation of Gangsta.",[143,144,147],"callout",{"icon":145,"type":146},"i-lucide-scroll","warning","Code that contradicts the spec means the spec needs revision — not the other way around. Never write code without a spec.",[149,150,152],"h2",{"id":151},"the-problem-spec-driven-development-solves","The Problem Spec-Driven Development Solves",[135,154,155],{},"Traditional AI-assisted development follows a dangerous pattern:",[157,158,159,163,166,169,172,175],"ol",{},[160,161,162],"li",{},"User describes what they want",[160,164,165],{},"AI agent starts writing code immediately",[160,167,168],{},"Code grows organically without a plan",[160,170,171],{},"Edge cases are discovered late (or never)",[160,173,174],{},"Requirements drift as implementation evolves",[160,176,177],{},"The final product doesn't match what was intended",[135,179,180,181,184],{},"Sound familiar? This is ",[138,182,183],{},"shadow development"," — code written without specification, driven by implementation convenience rather than intentional design.",[149,186,188],{"id":187},"the-spec-driven-alternative","The Spec-Driven Alternative",[135,190,191],{},"Gangsta enforces spec-driven development through the Heist Pipeline:",[193,194,195,211],"table",{},[196,197,198],"thead",{},[199,200,201,205,208],"tr",{},[202,203,204],"th",{},"Phase",[202,206,207],{},"What Happens",[202,209,210],{},"Code Allowed?",[212,213,214,225,234,247,256,266],"tbody",{},[199,215,216,219,222],{},[217,218,71],"td",{},[217,220,221],{},"Gather intel, understand context",[217,223,224],{},"❌ No",[199,226,227,229,232],{},[217,228,75],{},[217,230,231],{},"Debate approaches, surface risks",[217,233,224],{},[199,235,236,238,241],{},[217,237,79],{},[217,239,240],{},"Write the specification (Contract)",[217,242,243,244],{},"❌ ",[138,245,246],{},"Absolutely not",[199,248,249,251,254],{},[217,250,83],{},[217,252,253],{},"Plan tasks and allocate work",[217,255,224],{},[199,257,258,260,263],{},[217,259,87],{},[217,261,262],{},"Implement the spec",[217,264,265],{},"✅ Yes",[199,267,268,270,273],{},[217,269,91],{},[217,271,272],{},"Verify against the spec",[217,274,275],{},"❌ Only review",[135,277,278,279,282],{},"Notice that ",[138,280,281],{},"code is only written during one phase"," — The Hit. And by that point, you have:",[284,285,286,289,292,295],"ul",{},[160,287,288],{},"A Dossier that proves you understand the codebase",[160,290,291],{},"Grilling Conclusions that show you've debated alternatives",[160,293,294],{},"A signed Contract that defines exactly what will be built",[160,296,297],{},"A War Plan that breaks the work into manageable tasks",[149,299,301],{"id":300},"the-contract-source-of-truth","The Contract: Source of Truth",[135,303,304],{},"The Contract produced during The Sit-Down is the authoritative document. It includes:",[284,306,307,313,319,325,331,337,343],{},[160,308,309,312],{},[138,310,311],{},"Objective"," — What's being built and why",[160,314,315,318],{},[138,316,317],{},"Requirements"," — Functional and non-functional",[160,320,321,324],{},[138,322,323],{},"Architectural Decisions"," — Key design choices and rationale",[160,326,327,330],{},[138,328,329],{},"Grilling Conclusions"," — What was debated and decided",[160,332,333,336],{},[138,334,335],{},"Applicable Rules"," — Which constitution rules apply",[160,338,339,342],{},[138,340,341],{},"Acceptance Criteria"," — How to verify success",[160,344,345,348],{},[138,346,347],{},"Out of Scope"," — What's explicitly not being built",[135,350,351],{},"If during The Hit, a developer discovers the spec is wrong, the correct process is:",[157,353,354,359,365],{},[160,355,356],{},[138,357,358],{},"Stop implementation",[160,360,361,364],{},[138,362,363],{},"Revise the Contract"," (with Don approval)",[160,366,367],{},[138,368,369],{},"Then resume implementation",[135,371,372],{},"This is not bureaucracy — it's discipline. Every spec revision is tracked and intentional.",[149,374,376],{"id":375},"spec-vs-code-priority","Spec vs. Code Priority",[193,378,379,389],{},[196,380,381],{},[199,382,383,386],{},[202,384,385],{},"Scenario",[202,387,388],{},"Correct Action",[212,390,391,399,407,415],{},[199,392,393,396],{},[217,394,395],{},"Code works but contradicts spec",[217,397,398],{},"Revise the spec, then align the code",[199,400,401,404],{},[217,402,403],{},"Spec says X, but implementation reveals X is wrong",[217,405,406],{},"Revise the spec first, then fix the code",[199,408,409,412],{},[217,410,411],{},"Developer \"knows better\" than the spec",[217,413,414],{},"Follow the spec; propose a revision if needed",[199,416,417,420],{},[217,418,419],{},"Edge case not covered by spec",[217,421,422],{},"Add it to the spec, then implement",[149,424,426],{"id":425},"the-heist-cycle-enforces-this","The Heist Cycle Enforces This",[135,428,429],{},"The Heist Pipeline is structured specifically to prevent code-first development:",[143,431,434,435,438],{"icon":432,"type":433},"i-lucide-ban","danger","The Sit-Down (Phase 3) has an explicit rule: ",[138,436,437],{},"NO CODE ALLOWED."," If any code appears during spec drafting, the phase must restart. This is non-negotiable.",[135,440,441],{},"By the time code is written (The Hit), there's no ambiguity about what to build. The spec was debated (The Grilling), documented (The Sit-Down), and decomposed (Resource Development). The implementation phase is purely execution — no design decisions, no architectural debates, no scope creep.",[149,443,445],{"id":444},"benefits","Benefits",[284,447,448,454,460,466,472],{},[160,449,450,453],{},[138,451,452],{},"Predictable outcomes"," — The spec defines success before code is written",[160,455,456,459],{},[138,457,458],{},"Auditability"," — Every design decision is documented with rationale",[160,461,462,465],{},[138,463,464],{},"No scope creep"," — The Contract defines what's in scope and what's not",[160,467,468,471],{},[138,469,470],{},"Consistent quality"," — TDD during The Hit ensures code meets the spec",[160,473,474,477],{},[138,475,476],{},"Team alignment"," — Everyone works from the same specification",{"title":479,"searchDepth":16,"depth":16,"links":480},"",[481,482,483,484,485,486],{"id":151,"depth":16,"text":152},{"id":187,"depth":16,"text":188},{"id":300,"depth":16,"text":301},{"id":375,"depth":16,"text":376},{"id":425,"depth":16,"text":426},{"id":444,"depth":16,"text":445},"The philosophy at the core of Gangsta — spec is law, code is implementation.","md",null,{},{"order":47},{"title":44,"description":487},"3QOpHfC37SFweQVpvoGyKiSi_iqtFgj8gNDJl3QUSyc",[495,497],{"title":40,"path":41,"stem":42,"description":496,"order":26,"children":-1},"The five governance laws that prevent chaos in AI-assisted development.",{"title":49,"path":50,"stem":51,"description":498,"order":16,"children":-1},"The organizational structure of a Gangsta project — Don, Consigliere, Underboss, Capo, Soldier, and The Ledger.",1776282625801]