[{"data":1,"prerenderedAt":469},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-the-ledger":125,"-core-concepts-the-ledger-surround":464},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":57,"body":127,"description":457,"extension":458,"links":459,"meta":460,"navigation":461,"path":58,"seo":462,"stem":59,"__hash__":463},"docs/2.core-concepts/the-ledger.md",{"type":128,"value":129,"toc":443},"minimark",[130,134,138,163,168,173,176,181,202,206,209,213,228,232,235,239,254,258,264,274,278,281,285,292,296,299,323,327,330,407,411,414],[131,132,57],"h1",{"id":133},"the-ledger",[135,136,137],"p",{},"The Ledger is Gangsta's institutional memory. It persists across sessions, ensuring that lessons learned aren't lost when your AI session ends.",[139,140,143,154],"callout",{"icon":141,"type":142},"i-lucide-book-open","info",[135,144,145,149,150],{},[146,147,148],"strong",{},"Invocation:"," ",[151,152,153],"code",{},"gangsta:the-ledger",[135,155,156,149,159,162],{},[146,157,158],{},"Location:",[151,160,161],{},"docs/gangsta/"," in your project root",[164,165,167],"h2",{"id":166},"what-the-ledger-contains","What the Ledger Contains",[169,170,172],"h3",{"id":171},"insights","Insights",[135,174,175],{},"Successful patterns, non-obvious approaches, and domain knowledge worth preserving.",[135,177,178],{},[146,179,180],{},"Examples:",[182,183,184,188,199],"ul",{},[185,186,187],"li",{},"\"The payment gateway requires idempotency keys for all POST requests\"",[185,189,190,191,194,195,198],{},"\"React Query's ",[151,192,193],{},"useSuspenseQuery"," works better than ",[151,196,197],{},"useQuery"," for this project's SSR setup\"",[185,200,201],{},"\"The database migration system doesn't support column renames — always add + remove instead\"",[169,203,205],{"id":204},"fails","Fails",[135,207,208],{},"Documented mistakes — approaches that caused rework, confusion, or wasted effort.",[135,210,211],{},[146,212,180],{},[182,214,215,222,225],{},[185,216,217,218,221],{},"\"Don't use ",[151,219,220],{},"any"," in TypeScript configs — it bypasses the type checker in ways that aren't obvious\"",[185,223,224],{},"\"The external API rate-limits to 100 req/min, not 1000 as the docs claim\"",[185,226,227],{},"\"Running tests in parallel on this project causes flaky failures due to shared database state\"",[169,229,231],{"id":230},"constitution","Constitution",[135,233,234],{},"Accumulated rules that the team has agreed upon — project-specific extensions of Omerta.",[135,236,237],{},[146,238,180],{},[182,240,241,244,251],{},[185,242,243],{},"\"All database queries must use the QueryBuilder, never raw SQL\"",[185,245,246,247,250],{},"\"Feature flags must be in the ",[151,248,249],{},"config/features.yml"," file, not hardcoded\"",[185,252,253],{},"\"Every PR must include a test for the happy path and at least one error path\"",[164,255,257],{"id":256},"file-structure","File Structure",[135,259,260,261,263],{},"The Ledger lives in your project at ",[151,262,161],{},":",[265,266,271],"pre",{"className":267,"code":269,"language":270},[268],"language-text","docs/gangsta/\n├── insights/\n│   └── 2026-04-15-payment-idempotency.md\n├── fails/\n│   └── 2026-04-10-parallel-test-flakiness.md\n├── constitution/\n│   └── rules.md\n└── {heist-name}/\n    ├── checkpoints/\n    │   ├── 01-reconnaissance.md\n    │   ├── 02-the-grilling.md\n    │   └── ...\n    ├── recon/\n    │   └── 2026-04-15-recon-dossier.md\n    ├── specs/\n    │   └── 2026-04-15-contract.md\n    └── plans/\n        └── 2026-04-15-war-plan.md\n","text",[151,272,269],{"__ignoreMap":273},"",[164,275,277],{"id":276},"when-to-write-to-the-ledger","When to Write to the Ledger",[135,279,280],{},"The Ledger is updated during two key moments:",[169,282,284],{"id":283},"during-laundering","During Laundering",[135,286,287,288,291],{},"The final Heist phase (",[151,289,290],{},"gangsta:laundering",") includes a Ledger update step. The Consigliere reviews what worked, what failed, and what rules should be added to the constitution.",[169,293,295],{"id":294},"during-conversations","During Conversations",[135,297,298],{},"After any significant exchange outside a Heist — if the Don shares domain knowledge or if an approach is discovered that's worth preserving — offer to write a Ledger entry:",[139,300,302,312],{"icon":301,"type":142},"i-lucide-pen-line",[135,303,304,307,308],{},[146,305,306],{},"Protocol:"," After the exchange resolves, ask once: ",[309,310,311],"em",{},"\"Worth saving to the Ledger as an insight or fail?\"",[182,313,314,317,320],{},[185,315,316],{},"If yes: write the entry using the Ledger format",[185,318,319],{},"If no: drop it — never ask again for the same topic in the same session",[185,321,322],{},"Never write a Ledger entry without explicit Don approval",[164,324,326],{"id":325},"proactive-memory-capture","Proactive Memory Capture",[135,328,329],{},"Gangsta encourages proactive memory capture:",[331,332,333,346],"table",{},[334,335,336],"thead",{},[337,338,339,343],"tr",{},[340,341,342],"th",{},"Situation",[340,344,345],{},"Action",[347,348,349,361,370,379,389,398],"tbody",{},[337,350,351,355],{},[352,353,354],"td",{},"Non-obvious approach discovered",[352,356,357,358],{},"Offer to save as ",[146,359,360],{},"Insight",[337,362,363,366],{},[352,364,365],{},"Don shares domain knowledge",[352,367,357,368],{},[146,369,360],{},[337,371,372,375],{},[352,373,374],{},"Creative solution to a constraint",[352,376,357,377],{},[146,378,360],{},[337,380,381,384],{},[352,382,383],{},"Don rejects an approach",[352,385,357,386],{},[146,387,388],{},"Fail",[337,390,391,394],{},[352,392,393],{},"Approach causes rework",[352,395,357,396],{},[146,397,388],{},[337,399,400,403],{},[352,401,402],{},"Repeated mistake pattern",[352,404,357,405],{},[146,406,388],{},[164,408,410],{"id":409},"why-the-ledger-matters","Why the Ledger Matters",[135,412,413],{},"Without institutional memory, every session starts from zero. The Ledger ensures:",[182,415,416,422,428,434],{},[185,417,418,421],{},[146,419,420],{},"Insights compound"," — Successful patterns are reused, not rediscovered",[185,423,424,427],{},[146,425,426],{},"Fails aren't repeated"," — Documented mistakes prevent future waste",[185,429,430,433],{},[146,431,432],{},"Constitution grows"," — Project-specific rules accumulate over time",[185,435,436,439,440,442],{},[146,437,438],{},"New sessions are informed"," — Any agent can read ",[151,441,161],{}," and understand the project's history",{"title":273,"searchDepth":16,"depth":16,"links":444},[445,450,451,455,456],{"id":166,"depth":16,"text":167,"children":446},[447,448,449],{"id":171,"depth":21,"text":172},{"id":204,"depth":21,"text":205},{"id":230,"depth":21,"text":231},{"id":256,"depth":16,"text":257},{"id":276,"depth":16,"text":277,"children":452},[453,454],{"id":283,"depth":21,"text":284},{"id":294,"depth":21,"text":295},{"id":325,"depth":16,"text":326},{"id":409,"depth":16,"text":410},"Gangsta's institutional memory — insights, fails, and constitution rules that persist across sessions.","md",null,{},{"order":60},{"title":57,"description":457},"tqCg5bSimVLutJJL35mtzK-hZ0Vsrp74t6XBdQ1ua3M",[465,467],{"title":53,"path":54,"stem":55,"description":466,"order":21,"children":-1},"The 6-phase development cycle that every feature goes through in Gangsta.",{"title":53,"path":65,"stem":69,"description":468,"order":11,"children":-1},"The 6-phase development cycle — from reconnaissance to laundering.",1776282625801]