[{"data":1,"prerenderedAt":475},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline-laundering":125,"-heist-pipeline-laundering-surround":470},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":91,"body":127,"description":463,"extension":464,"links":465,"meta":466,"navigation":467,"path":92,"seo":468,"stem":93,"__hash__":469},"docs/3.heist-pipeline/6.laundering.md",{"type":128,"value":129,"toc":449},"minimark",[130,134,141,144,158,167,172,212,216,223,256,260,263,268,279,283,294,298,309,313,316,345,349,353,357,360,389,393,443],[131,132,91],"h1",{"id":133},"laundering",[135,136,137],"p",{},[138,139,140],"strong",{},"Phase 6 of the Heist Pipeline",[135,142,143],{},"Verification and integration. The Consigliere reviews all deliverables against the Contract, the code is integrated, and The Ledger is updated with insights and fails. The output is clean, production-ready code.",[135,145,146,149,150,154,157],{},[138,147,148],{},"Skill:"," ",[151,152,153],"code",{},"gangsta:laundering",[138,155,156],{},"Skill type:"," Flexible — verification adapts to project complexity",[159,160,163,166],"callout",{"icon":161,"type":162},"i-lucide-check-circle","info",[138,164,165],{},"Purpose:"," Ensure the final product matches the Contract, is properly integrated, and that lessons learned are preserved for future Heists.",[168,169,171],"h2",{"id":170},"process","Process",[173,174,175,182,188,194,200,206],"ol",{},[176,177,178,181],"li",{},[138,179,180],{},"Consigliere review"," — Architectural advisor reviews all code against the Contract",[176,183,184,187],{},[138,185,186],{},"Integration testing"," — Verify all components work together correctly",[176,189,190,193],{},[138,191,192],{},"Acceptance verification"," — Check each acceptance criterion from the Contract",[176,195,196,199],{},[138,197,198],{},"Ledger update"," — Record insights (what worked) and fails (what didn't)",[176,201,202,205],{},[138,203,204],{},"Constitution amendments"," — Propose new rules based on lessons learned",[176,207,208,211],{},[138,209,210],{},"Final delivery"," — Clean, verified, production-ready code",[168,213,215],{"id":214},"consigliere-review","Consigliere Review",[135,217,218,219,222],{},"The Consigliere (",[151,220,221],{},"gangsta:the-consigliere",") provides an impartial architectural review:",[224,225,226,232,238,244,250],"ul",{},[176,227,228,231],{},[138,229,230],{},"Code quality"," — Does the implementation follow established patterns?",[176,233,234,237],{},[138,235,236],{},"Security"," — Are there vulnerabilities or security concerns?",[176,239,240,243],{},[138,241,242],{},"Performance"," — Are there bottlenecks or inefficiencies?",[176,245,246,249],{},[138,247,248],{},"Contract compliance"," — Does the code match the signed specification?",[176,251,252,255],{},[138,253,254],{},"Test coverage"," — Are edge cases covered?",[168,257,259],{"id":258},"ledger-update","Ledger Update",[135,261,262],{},"This is when institutional memory is captured:",[264,265,267],"h3",{"id":266},"insights","Insights",[224,269,270,273,276],{},[176,271,272],{},"Successful patterns that should be reused",[176,274,275],{},"Non-obvious approaches that worked well",[176,277,278],{},"Domain knowledge the Don shared during the Heist",[264,280,282],{"id":281},"fails","Fails",[224,284,285,288,291],{},[176,286,287],{},"Approaches that caused rework or confusion",[176,289,290],{},"Mistakes that should not be repeated",[176,292,293],{},"Process inefficiencies discovered",[264,295,297],{"id":296},"constitution","Constitution",[224,299,300,303,306],{},[176,301,302],{},"New rules proposed based on this Heist's experience",[176,304,305],{},"Amendments to existing rules",[176,307,308],{},"Project-specific conventions to formalize",[168,310,312],{"id":311},"output-clean-delivery","Output: Clean Delivery",[135,314,315],{},"The final output of a Heist is:",[224,317,318,324,330,336],{},[176,319,320,323],{},[138,321,322],{},"Production-ready code"," — Verified against the Contract",[176,325,326,329],{},[138,327,328],{},"Complete test suite"," — Proving all acceptance criteria are met",[176,331,332,335],{},[138,333,334],{},"Updated Ledger"," — Insights, fails, and constitution amendments",[176,337,338,341,342],{},[138,339,340],{},"Heist archive"," — Complete documentation in ",[151,343,344],{},"docs/gangsta/",[168,346,348],{"id":347},"phase-gate","Phase Gate",[347,350,352],{"title":351},"GATE: Heist Complete","The Don verifies all acceptance criteria are met, the Consigliere review is satisfactory, the Ledger has been updated, and integration tests pass. The Don declares the Heist complete — the final stamp of approval that the feature is delivered.",[168,354,356],{"id":355},"what-happens-after-a-heist","What Happens After a Heist",[135,358,359],{},"Once the Don declares the Heist complete:",[173,361,362,371,377,383],{},[176,363,364,367,368,370],{},[138,365,366],{},"Archive"," — All Heist documentation remains in ",[151,369,344],{}," for future reference",[176,372,373,376],{},[138,374,375],{},"Ledger persists"," — Insights, fails, and constitution rules are available for future sessions",[176,378,379,382],{},[138,380,381],{},"Clean slate"," — The next feature starts a fresh Heist cycle",[176,384,385,388],{},[138,386,387],{},"Carry-forward"," — New Heists can reference previous dossiers and contracts",[168,390,392],{"id":391},"checklist-before-declaring-complete","Checklist Before Declaring Complete",[224,394,397,407,413,419,425,431,437],{"className":395},[396],"contains-task-list",[176,398,401,406],{"className":399},[400],"task-list-item",[402,403],"input",{"disabled":404,"type":405},true,"checkbox"," All acceptance criteria met",[176,408,410,412],{"className":409},[400],[402,411],{"disabled":404,"type":405}," Consigliere review completed",[176,414,416,418],{"className":415},[400],[402,417],{"disabled":404,"type":405}," Integration tests passing",[176,420,422,424],{"className":421},[400],[402,423],{"disabled":404,"type":405}," Ledger updated with insights",[176,426,428,430],{"className":427},[400],[402,429],{"disabled":404,"type":405}," Ledger updated with fails",[176,432,434,436],{"className":433},[400],[402,435],{"disabled":404,"type":405}," Constitution amendments proposed (if any)",[176,438,440,442],{"className":439},[400],[402,441],{"disabled":404,"type":405}," Don declares Heist complete",[135,444,445],{},[446,447,448],"a",{"href":88},"Previous: The Hit ←",{"title":450,"searchDepth":16,"depth":16,"links":451},"",[452,453,454,459,460,461,462],{"id":170,"depth":16,"text":171},{"id":214,"depth":16,"text":215},{"id":258,"depth":16,"text":259,"children":455},[456,457,458],{"id":266,"depth":21,"text":267},{"id":281,"depth":21,"text":282},{"id":296,"depth":21,"text":297},{"id":311,"depth":16,"text":312},{"id":347,"depth":16,"text":348},{"id":355,"depth":16,"text":356},{"id":391,"depth":16,"text":392},"Phase 6 — Verification, integration, and Ledger update. Clean production-ready code.","md",null,{},{"order":47},{"title":91,"description":463},"F-jvtbqB66MOVeZ6Dex-Y8gybkrsJWIKoqMATnei-1I",[471,473],{"title":87,"path":88,"stem":89,"description":472,"order":60,"children":-1},"Phase 5 — Parallel execution by Soldiers using Test-Driven Development and tribute tracking.",{"title":95,"path":96,"stem":97,"description":474,"children":-1},"All 20 battle-tested Gangsta skills — each a pure markdown file that can be installed to any AI agent platform.",1776282626914]