[{"data":1,"prerenderedAt":451},["ShallowReactive",2],{"navigation_docs":3,"-getting-started":125,"-getting-started-surround":448},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":10,"body":127,"description":441,"extension":442,"links":443,"meta":444,"navigation":445,"path":6,"seo":446,"stem":7,"__hash__":447},"docs/1.getting-started/index.md",{"type":128,"value":129,"toc":434},"minimark",[130,134,143,152,156,159,172,175,181,184,191],[131,132,10],"h1",{"id":133},"what-is-gangsta",[135,136,137,138,142],"p",{},"Gangsta is an ",[139,140,141],"strong",{},"AI agentic skills framework"," for spec-driven development. It provides a structured protocol — organized around the metaphor of a Borgata (mafia family) — that turns chaotic AI-assisted coding into disciplined, repeatable operations.",[144,145,148,151],"callout",{"icon":146,"type":147},"i-lucide-lightbulb","info",[139,149,150],{},"The core idea:"," Before you write a single line of code, you write a spec. Before you execute, you plan. The Heist Pipeline ensures every feature goes through reconnaissance, debate, and approval before implementation begins.",[153,154,23],"h2",{"id":155},"the-1-rule",[135,157,158],{},"The framework's single most important behavioral rule:",[144,160,163,164,167,168,171],{"icon":161,"type":162},"i-lucide-shield","warning","If there's even a ",[139,165,166],{},"1% chance"," a Gangsta skill applies to what you're doing, you ",[139,169,170],{},"must"," invoke it. No rationalizing your way around the framework.",[135,173,174],{},"This means no skipping steps, no deciding \"this is too simple for a Heist,\" and no going straight to code. The framework exists because undisciplined AI agents produce unreliable output — the skills enforce the discipline that produces reliable results.",[135,176,177],{},[178,179,180],"a",{"href":24},"Read the full 1% Rule →",[153,182,53],{"id":183},"the-heist-pipeline",[135,185,186,187,190],{},"Every feature development cycle in Gangsta is called a ",[139,188,189],{},"Heist"," — a 6-phase operational process:",[192,193,194,228,235,240,244,251,366,373,406,411,414,419,426,429],"pipeline-flow",{},[195,196,197,203,208,213,218,223],"ol",{},[198,199,200,202],"li",{},[139,201,71],{}," — Intel gathering, codebase exploration, requirement analysis",[198,204,205,207],{},[139,206,75],{}," — Adversarial debate between proposer and devil's advocate",[198,209,210,212],{},[139,211,79],{}," — Spec drafting (no code allowed)",[198,214,215,217],{},[139,216,83],{}," — Task decomposition, infrastructure prep",[198,219,220,222],{},[139,221,87],{}," — Parallel execution by Soldiers",[198,224,225,227],{},[139,226,91],{}," — Verification, integration, Ledger update",[135,229,230,231,234],{},"Each phase has a ",[139,232,233],{},"gate"," — the Don (you) must approve before moving to the next phase. No auto-advancing. No skipping.",[135,236,237],{},[178,238,239],{"href":65},"Explore the full Heist Pipeline →",[153,241,243],{"id":242},"_20-skills-5-platforms","20 Skills, 5 Platforms",[135,245,246,247,250],{},"Gangsta provides ",[139,248,249],{},"20 skills"," across three categories:",[252,253,254,270],"table",{},[255,256,257],"thead",{},[258,259,260,264,267],"tr",{},[261,262,263],"th",{},"Category",[261,265,266],{},"Skills",[261,268,269],{},"Purpose",[271,272,273,303,333],"tbody",{},[258,274,275,281,300],{},[276,277,278],"td",{},[139,279,280],{},"Hierarchy Roles",[276,282,283,287,288,287,291,287,294,287,297],{},[284,285,286],"code",{},"the-consigliere",", ",[284,289,290],{},"the-underboss",[284,292,293],{},"the-capo",[284,295,296],{},"the-ledger",[284,298,299],{},"omerta",[276,301,302],{},"Organization and governance",[258,304,305,310,330],{},[276,306,307],{},[139,308,309],{},"Heist Phases",[276,311,312,287,315,287,318,287,321,287,324,287,327],{},[284,313,314],{},"reconnaissance",[284,316,317],{},"the-grilling",[284,319,320],{},"the-sit-down",[284,322,323],{},"resource-development",[284,325,326],{},"the-hit",[284,328,329],{},"laundering",[276,331,332],{},"Structured development cycles",[258,334,335,340,363],{},[276,336,337],{},[139,338,339],{},"Dev Skills",[276,341,342,287,345,287,348,287,351,287,354,287,357,287,360],{},[284,343,344],{},"interrogation-debugging",[284,346,347],{},"drill-tdd",[284,349,350],{},"safehouse-worktrees",[284,352,353],{},"audit-review",[284,355,356],{},"receiving-orders",[284,358,359],{},"sweep-verification",[284,361,362],{},"exit-strategy",[276,364,365],{},"Tactical development tools",[135,367,368,369,372],{},"These skills run on ",[139,370,371],{},"5 platforms",":",[374,375,376,382,388,394,400],"ul",{},[198,377,378,381],{},[139,379,380],{},"Claude Code"," — Original target, full skill support",[198,383,384,387],{},[139,385,386],{},"OpenCode"," — Plugin-based integration",[198,389,390,393],{},[139,391,392],{},"Codex"," — Skills directory symlink",[198,395,396,399],{},[139,397,398],{},"Gemini CLI"," — Extension-based install",[198,401,402,405],{},[139,403,404],{},"Cursor"," — Follows Claude Code conventions",[135,407,408],{},[178,409,410],{"href":14},"Install Gangsta →",[153,412,44],{"id":413},"spec-driven-development",[135,415,416,417,372],{},"At its core, Gangsta enforces ",[139,418,44],{},[144,420,422,425],{"icon":421,"type":147},"i-lucide-scroll",[139,423,424],{},"Spec is Law."," Code that contradicts the spec means the spec needs revision — not the other way around. Never write code without a spec.",[135,427,428],{},"This isn't just a preference — it's Omerta Law #5. The Heist Pipeline is specifically designed to produce specs before code, debate specs before committing, and verify code against specs before delivery.",[135,430,431],{},[178,432,433],{"href":41},"Learn about Omerta Laws →",{"title":435,"searchDepth":16,"depth":16,"links":436},"",[437,438,439,440],{"id":155,"depth":16,"text":23},{"id":183,"depth":16,"text":53},{"id":242,"depth":16,"text":243},{"id":413,"depth":16,"text":44},"An AI agentic skills framework for spec-driven development, organized around the Borgata metaphor.","md",null,{},{"order":11},{"title":10,"description":441},"id65uiG6dkgkyOYfE72l4bkmViA4bNmIVFu52ws-nTM",[443,449],{"title":13,"path":14,"stem":15,"description":450,"order":16,"children":-1},"Install Gangsta skills on your preferred AI development platform.",1776282626914]