[{"data":1,"prerenderedAt":405},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline":125,"-heist-pipeline-surround":400},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":53,"body":127,"description":393,"extension":394,"links":395,"meta":396,"navigation":397,"path":65,"seo":398,"stem":69,"__hash__":399},"docs/3.heist-pipeline/index.md",{"type":128,"value":129,"toc":386},"minimark",[130,134,138],[131,132,53],"h1",{"id":133},"the-heist-pipeline",[135,136,137],"p",{},"Every feature development cycle in Gangsta follows the same structured process — a 6-phase Heist that ensures specs are written before code, designs are debated before committing, and results are verified before delivery.",[139,140,141,146,297,301,309,318,322,325,331,337,341,344,364,369,373,383],"pipeline-flow",{},[142,143,145],"h2",{"id":144},"phase-overview","Phase Overview",[147,148,149,171],"table",{},[150,151,152],"thead",{},[153,154,155,159,162,165,168],"tr",{},[156,157,158],"th",{},"#",[156,160,161],{},"Phase",[156,163,164],{},"Skill",[156,166,167],{},"Gate",[156,169,170],{},"Output",[172,173,174,197,217,237,257,277],"tbody",{},[153,175,176,180,185,191,194],{},[177,178,179],"td",{},"1",[177,181,182],{},[183,184,71],"a",{"href":72},[177,186,187],{},[188,189,190],"code",{},"gangsta:reconnaissance",[177,192,193],{},"Dossier approved",[177,195,196],{},"Intel report",[153,198,199,202,206,211,214],{},[177,200,201],{},"2",[177,203,204],{},[183,205,75],{"href":76},[177,207,208],{},[188,209,210],{},"gangsta:the-grilling",[177,212,213],{},"Consensus approved",[177,215,216],{},"Design decisions",[153,218,219,222,226,231,234],{},[177,220,221],{},"3",[177,223,224],{},[183,225,79],{"href":80},[177,227,228],{},[188,229,230],{},"gangsta:the-sit-down",[177,232,233],{},"Contract signed",[177,235,236],{},"Specification",[153,238,239,242,246,251,254],{},[177,240,241],{},"4",[177,243,244],{},[183,245,83],{"href":84},[177,247,248],{},[188,249,250],{},"gangsta:resource-development",[177,252,253],{},"War Plan approved",[177,255,256],{},"Task breakdown",[153,258,259,262,266,271,274],{},[177,260,261],{},"5",[177,263,264],{},[183,265,87],{"href":88},[177,267,268],{},[188,269,270],{},"gangsta:the-hit",[177,272,273],{},"Completion approved",[177,275,276],{},"Working code",[153,278,279,282,286,291,294],{},[177,280,281],{},"6",[177,283,284],{},[183,285,91],{"href":92},[177,287,288],{},[188,289,290],{},"gangsta:laundering",[177,292,293],{},"Heist complete",[177,295,296],{},"Clean delivery",[142,298,300],{"id":299},"phase-gates","Phase Gates",[135,302,303,304,308],{},"Every phase ends with a ",[305,306,307],"strong",{},"gate"," — a checkpoint requiring the Don's explicit approval. The framework never auto-advances to the next phase.",[310,311,314,317],"callout",{"icon":312,"type":313},"i-lucide-shield","warning",[305,315,316],{},"You are the Don."," Your approval is required at every gate. If the output is incomplete or incorrect, reject it. The Heist only progresses when you say so.",[142,319,321],{"id":320},"starting-a-heist","Starting a Heist",[135,323,324],{},"Express a building intention to your AI tool:",[326,327,328],"blockquote",{},[135,329,330],{},"\"I want to add user notifications to my app\"",[135,332,333,334,336],{},"The 1% Rule triggers ",[188,335,190],{}," automatically. From there, each phase flows into the next with your approval at every gate.",[142,338,340],{"id":339},"resuming-a-heist","Resuming a Heist",[135,342,343],{},"If a session is interrupted:",[345,346,347,355,358,361],"ol",{},[348,349,350,351,354],"li",{},"Check ",[188,352,353],{},"docs/gangsta/"," for checkpoint files",[348,356,357],{},"Read the latest checkpoint",[348,359,360],{},"Present the resume context to the Don",[348,362,363],{},"Continue from the last completed phase",[135,365,366],{},[183,367,368],{"href":111},"Checkpoint Recovery guide →",[142,370,372],{"id":371},"the-full-cycle","The Full Cycle",[374,375,380],"pre",{"className":376,"code":378,"language":379},[377],"language-text","Reconnaissance ──→ The Grilling ──→ The Sit-Down ──→ Resource Dev ──→ The Hit ──→ Laundering\n     │                  │                  │                 │              │             │\n  Dossier          Consensus          Contract          War Plan       Code +        Clean\n  approved          approved           signed             approved      Tributes     Delivery\n","text",[188,381,378],{"__ignoreMap":382},"",[135,384,385],{},"Each phase produces a concrete artifact that the next phase depends on. You cannot skip phases, and you cannot proceed without explicit approval.",{"title":382,"searchDepth":16,"depth":16,"links":387},[388,389,390,391,392],{"id":144,"depth":16,"text":145},{"id":299,"depth":16,"text":300},{"id":320,"depth":16,"text":321},{"id":339,"depth":16,"text":340},{"id":371,"depth":16,"text":372},"The 6-phase development cycle — from reconnaissance to laundering.","md",null,{},{"order":11},{"title":53,"description":393},"hlAr-9Zhx0emCSN2J-HvoNv8cAiwv2yDGx8rcFKdka8",[401,403],{"title":57,"path":58,"stem":59,"description":402,"order":60,"children":-1},"Gangsta's institutional memory — insights, fails, and constitution rules that persist across sessions.",{"title":71,"path":72,"stem":73,"description":404,"order":16,"children":-1},"Phase 1 — Gather intel on the codebase, requirements, and constraints before any design begins.",1776282625801]