[{"data":1,"prerenderedAt":430},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-the-borgata":125,"-core-concepts-the-borgata-surround":425},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":49,"body":127,"description":418,"extension":419,"links":420,"meta":421,"navigation":422,"path":50,"seo":423,"stem":51,"__hash__":424},"docs/2.core-concepts/the-borgata.md",{"type":128,"value":129,"toc":406},"minimark",[130,134,138],[131,132,49],"h1",{"id":133},"the-borgata-hierarchy",[135,136,137],"p",{},"Gangsta organizes AI agent roles around the Borgata — a mafia family hierarchy. Each role has specific responsibilities and authority levels. You (the user) are always the Don.",[139,140,141,146,151,154,183,187,190,218,222,225,249,253,256,280,284,287,304,308,311,324,327,330,354,358,361,371,374,400],"hierarchy-tree",{},[142,143,145],"h2",{"id":144},"the-roles","The Roles",[147,148,150],"h3",{"id":149},"don-you","Don (You)",[135,152,153],{},"The supreme authority. You approve every phase gate, sign every Contract, and declare every Heist complete. The framework never auto-advances without your explicit approval.",[155,156,157,165,171,177],"ul",{},[158,159,160,164],"li",{},[161,162,163],"strong",{},"Authority:"," Final decision on all matters",[158,166,167,170],{},[161,168,169],{},"Responsibility:"," Approve dossiers, sign contracts, approve war plans, declare heists complete",[158,172,173,176],{},[161,174,175],{},"Invokes:"," Any skill, at any time",[158,178,179,182],{},[161,180,181],{},"Rule:"," Your word is law. When instructions conflict, Don's explicit instructions override everything.",[147,184,186],{"id":185},"consigliere","Consigliere",[135,188,189],{},"The strategic advisor. Outside the chain of command — provides impartial architectural guidance, security review, and code auditing.",[155,191,192,202,207,212],{},[158,193,194,197,198],{},[161,195,196],{},"Invocation:"," ",[199,200,201],"code",{},"gangsta:the-consigliere",[158,203,204,206],{},[161,205,163],{}," Advisory only — no direct command power",[158,208,209,211],{},[161,210,169],{}," Architectural review, security analysis, impartial assessment",[158,213,214,217],{},[161,215,216],{},"Used for:"," Bug diagnosis, code review, architecture decisions",[147,219,221],{"id":220},"underboss","Underboss",[135,223,224],{},"The Chief Operating Officer. Handles task decomposition, resource allocation, and planning. Dispatches work to Capos and Soldiers.",[155,226,227,234,239,244],{},[158,228,229,197,231],{},[161,230,196],{},[199,232,233],{},"gangsta:the-underboss",[158,235,236,238],{},[161,237,163],{}," Task assignment and decomposition",[158,240,241,243],{},[161,242,169],{}," Break Contracts into work packages, assign territories, manage dependencies",[158,245,246,248],{},[161,247,216],{}," Resource Development phase, complex multi-task coordination",[147,250,252],{"id":251},"capo","Capo",[135,254,255],{},"The domain crew lead. Each Capo owns a territory (a domain of the codebase) and orchestrates work within it.",[155,257,258,265,270,275],{},[158,259,260,197,262],{},[161,261,196],{},[199,263,264],{},"gangsta:the-capo",[158,266,267,269],{},[161,268,163],{}," Per-territory orchestration",[158,271,272,274],{},[161,273,169],{}," Coordinate soldiers within a territory, enforce local quality standards",[158,276,277,279],{},[161,278,216],{}," Multi-file changes within a domain, territory-specific execution",[147,281,283],{"id":282},"soldier-subagent","Soldier (Subagent)",[135,285,286],{},"The executor. Stateless code-execution agents that implement assigned tasks. They follow orders, write code, and run tests.",[155,288,289,294,299],{},[158,290,291,293],{},[161,292,163],{}," None — executes assigned tasks only",[158,295,296,298],{},[161,297,169],{}," Implement code per the Contract and War Plan",[158,300,301,303],{},[161,302,216],{}," The Hit phase — parallel code execution with TDD",[147,305,307],{"id":306},"associate-external-tool","Associate (External Tool)",[135,309,310],{},"External tools and API proxies. Not part of the hierarchy — they provide services that Soldiers and Capos use.",[155,312,313,319],{},[158,314,315,318],{},[161,316,317],{},"Examples:"," GitHub API, database clients, CI/CD systems",[158,320,321,323],{},[161,322,216],{}," Any external service interaction",[147,325,57],{"id":326},"the-ledger",[135,328,329],{},"Institutional memory. Not a role but a record — persists insights, fails, and constitution rules across sessions.",[155,331,332,339,348],{},[158,333,334,197,336],{},[161,335,196],{},[199,337,338],{},"gangsta:the-ledger",[158,340,341,197,344,347],{},[161,342,343],{},"Location:",[199,345,346],{},"docs/gangsta/"," in your project",[158,349,350,353],{},[161,351,352],{},"Contains:"," Insights (successful patterns), Fails (documented mistakes), Constitution (accumulated rules)",[142,355,357],{"id":356},"chain-of-command","Chain of Command",[135,359,360],{},"The hierarchy enforces a strict chain of command:",[362,363,368],"pre",{"className":364,"code":366,"language":367},[365],"language-text","Don (You)\n  ├── Consigliere (Advisory)\n  ├── Underboss (Operations)\n  │   ├── Capo (Crew Lead)\n  │   │   └── Soldiers (Execution)\n  │   └── Associates (External)\n  └── The Ledger (Memory)\n","text",[199,369,366],{"__ignoreMap":370},"",[135,372,373],{},"This ensures:",[155,375,376,382,388,394],{},[158,377,378,381],{},[161,379,380],{},"No rogue agents"," — Soldiers only execute assigned tasks",[158,383,384,387],{},[161,385,386],{},"No skipped gates"," — Every phase requires Don approval",[158,389,390,393],{},[161,391,392],{},"No lost knowledge"," — The Ledger persists across sessions",[158,395,396,399],{},[161,397,398],{},"No architectural drift"," — The Consigliere keeps the big picture",[135,401,402],{},[403,404,405],"a",{"href":58},"Learn about The Ledger →",{"title":370,"searchDepth":16,"depth":16,"links":407},[408,417],{"id":144,"depth":16,"text":145,"children":409},[410,411,412,413,414,415,416],{"id":149,"depth":21,"text":150},{"id":185,"depth":21,"text":186},{"id":220,"depth":21,"text":221},{"id":251,"depth":21,"text":252},{"id":282,"depth":21,"text":283},{"id":306,"depth":21,"text":307},{"id":326,"depth":21,"text":57},{"id":356,"depth":16,"text":357},"The organizational structure of a Gangsta project — Don, Consigliere, Underboss, Capo, Soldier, and The Ledger.","md",null,{},{"order":16},{"title":49,"description":418},"XY0nawuLj0vCOp-wzqjKxt1JUJ-goHIoSdVySRCusaQ",[426,428],{"title":44,"path":45,"stem":46,"description":427,"order":47,"children":-1},"The philosophy at the core of Gangsta — spec is law, code is implementation.",{"title":53,"path":54,"stem":55,"description":429,"order":21,"children":-1},"The 6-phase development cycle that every feature goes through in Gangsta.",1776282625801]