[{"data":1,"prerenderedAt":418},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-the-heist":125,"-core-concepts-the-heist-surround":413},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":53,"body":127,"description":406,"extension":407,"links":408,"meta":409,"navigation":410,"path":54,"seo":411,"stem":55,"__hash__":412},"docs/2.core-concepts/the-heist.md",{"type":128,"value":129,"toc":392},"minimark",[130,134,143],[131,132,53],"h1",{"id":133},"the-heist-pipeline",[135,136,137,138,142],"p",{},"Every feature development cycle in Gangsta is called a ",[139,140,141],"strong",{},"Heist"," — a structured 6-phase process that ensures specs are written before code, designs are debated before committing, and results are verified before delivery.",[144,145,146,151,156,166,173,179,185,189,196,203,208,213,217,224,230,235,240,244,251,257,262,267,271,278,288,293,298,302,309,315,320,325,329,332,341,345,348,354,360,364,367,387],"pipeline-flow",{},[147,148,150],"h2",{"id":149},"the-six-phases","The Six Phases",[152,153,155],"h3",{"id":154},"_1-reconnaissance","1. Reconnaissance",[135,157,158,161,162],{},[139,159,160],{},"Skill:"," ",[163,164,165],"code",{},"gangsta:reconnaissance",[135,167,168,169,172],{},"Gather intel. The agent deploys associates to explore the codebase, identify patterns, find dependencies, and understand requirements. The output is a ",[139,170,171],{},"Dossier"," — a structured intelligence report.",[135,174,175,178],{},[139,176,177],{},"Gate:"," Don approves the Dossier.",[135,180,181],{},[182,183,184],"a",{"href":72},"Reconnaissance deep dive →",[152,186,188],{"id":187},"_2-the-grilling","2. The Grilling",[135,190,191,161,193],{},[139,192,160],{},[163,194,195],{},"gangsta:the-grilling",[135,197,198,199,202],{},"Adversarial debate. A Proposer argues for the best approach while a Devil's Advocate challenges every assumption. This surfaces edge cases, risks, and trade-offs that single-perspective design misses. The output is ",[139,200,201],{},"Grilling Conclusions",".",[135,204,205,207],{},[139,206,177],{}," Don approves the consensus.",[135,209,210],{},[182,211,212],{"href":76},"The Grilling deep dive →",[152,214,216],{"id":215},"_3-the-sit-down","3. The Sit-Down",[135,218,219,161,221],{},[139,220,160],{},[163,222,223],{},"gangsta:the-sit-down",[135,225,226,227,202],{},"Spec drafting. No code is allowed during this phase — only specification. The Contract defines scope, out-of-scope, acceptance criteria, architectural decisions, and applicable rules. The output is a ",[139,228,229],{},"signed Contract",[135,231,232,234],{},[139,233,177],{}," Don signs the Contract.",[135,236,237],{},[182,238,239],{"href":80},"The Sit-Down deep dive →",[152,241,243],{"id":242},"_4-resource-development","4. Resource Development",[135,245,246,161,248],{},[139,247,160],{},[163,249,250],{},"gangsta:resource-development",[135,252,253,254,202],{},"Task decomposition. The Contract is broken into parallel work packages, territories are assigned to Capos, and resources are allocated. The output is a ",[139,255,256],{},"War Plan",[135,258,259,261],{},[139,260,177],{}," Don approves the War Plan.",[135,263,264],{},[182,265,266],{"href":84},"Resource Development deep dive →",[152,268,270],{"id":269},"_5-the-hit","5. The Hit",[135,272,273,161,275],{},[139,274,160],{},[163,276,277],{},"gangsta:the-hit",[135,279,280,281,284,285,202],{},"Parallel execution. Soldiers implement their assigned tasks, using TDD (",[163,282,283],{},"gangsta:drill-tdd",") for each work package. Budget tributes are tracked. The output is ",[139,286,287],{},"implemented code with tributes",[135,289,290,292],{},[139,291,177],{}," Don approves completion.",[135,294,295],{},[182,296,297],{"href":88},"The Hit deep dive →",[152,299,301],{"id":300},"_6-laundering","6. Laundering",[135,303,304,161,306],{},[139,305,160],{},[163,307,308],{},"gangsta:laundering",[135,310,311,312,202],{},"Verification and integration. The Consigliere reviews all deliverables against the Contract. The Ledger is updated with insights and fails. The output is ",[139,313,314],{},"clean, production-ready code",[135,316,317,319],{},[139,318,177],{}," Don declares the Heist complete.",[135,321,322],{},[182,323,324],{"href":92},"Laundering deep dive →",[147,326,328],{"id":327},"phase-gates","Phase Gates",[135,330,331],{},"Every phase ends with a gate — a checkpoint that requires the Don's explicit approval. This is non-negotiable:",[333,334,337,340],"callout",{"icon":335,"type":336},"i-lucide-shield","warning",[139,338,339],{},"No auto-advancing."," The framework never moves to the next phase without your approval. If you're unsure, ask for more information. If the output is incomplete, reject it and ask for revisions.",[147,342,344],{"id":343},"starting-a-heist","Starting a Heist",[135,346,347],{},"To start a Heist, simply express a building intention in your AI tool:",[349,350,351],"blockquote",{},[135,352,353],{},"\"I want to build a new feature\"",[135,355,356,357,359],{},"The agent will invoke ",[163,358,165],{}," automatically (the 1% Rule ensures this). From there, each phase flows into the next — with your approval at every gate.",[147,361,363],{"id":362},"resuming-a-heist","Resuming a Heist",[135,365,366],{},"If a session is interrupted, the next session can resume from the last checkpoint:",[368,369,370,378,381,384],"ol",{},[371,372,373,374,377],"li",{},"Check ",[163,375,376],{},"docs/gangsta/"," for checkpoint files",[371,379,380],{},"Read the latest checkpoint",[371,382,383],{},"Present the resume context to the Don",[371,385,386],{},"Continue from the phase where you left off",[135,388,389],{},[182,390,391],{"href":111},"Checkpoint Recovery →",{"title":393,"searchDepth":16,"depth":16,"links":394},"",[395,403,404,405],{"id":149,"depth":16,"text":150,"children":396},[397,398,399,400,401,402],{"id":154,"depth":21,"text":155},{"id":187,"depth":21,"text":188},{"id":215,"depth":21,"text":216},{"id":242,"depth":21,"text":243},{"id":269,"depth":21,"text":270},{"id":300,"depth":21,"text":301},{"id":327,"depth":16,"text":328},{"id":343,"depth":16,"text":344},{"id":362,"depth":16,"text":363},"The 6-phase development cycle that every feature goes through in Gangsta.","md",null,{},{"order":21},{"title":53,"description":406},"CGCxtkAOxMf3-0f5xaavzKOvBzE-q4M1MvMFaSZd6XM",[414,416],{"title":49,"path":50,"stem":51,"description":415,"order":16,"children":-1},"The organizational structure of a Gangsta project — Don, Consigliere, Underboss, Capo, Soldier, and The Ledger.",{"title":57,"path":58,"stem":59,"description":417,"order":60,"children":-1},"Gangsta's institutional memory — insights, fails, and constitution rules that persist across sessions.",1776282626914]