Heist Pipeline
Reconnaissance
Phase 1 — Gather intel on the codebase, requirements, and constraints before any design begins.
Reconnaissance
Phase 1 of the Heist Pipeline
Gather intelligence before any design or code begins. The agent deploys associates to explore the codebase, identify patterns, find dependencies, and understand requirements.
Skill: gangsta:reconnaissanceSkill type: Flexible — adapt principles to context
Purpose: Understand what exists before deciding what to build. Reconnaissance produces the intel that every subsequent phase depends on.
Process
- Deploy associates — The agent sends subagents to explore different parts of the codebase
- Scan architecture — Identify tech stack, directory structure, patterns, and conventions
- Map dependencies — Find existing modules, APIs, and services that relate to the feature
- Identify constraints — Document technical limitations, performance requirements, and security considerations
- Gather requirements — Understand what the Don (you) actually wants, not just what was said
- Produce the Dossier — Compile findings into a structured intelligence report
Output: The Dossier
The Dossier is a structured document containing:
- Codebase Overview — Architecture, tech stack, existing patterns
- Dependencies Identified — Related modules, APIs, services
- Constraints — Technical limitations, performance requirements
- Risks and Unknowns — What needs further investigation
- Recommended Scope — What reconnaissance suggests the feature should cover
Phase Gate
GATE: Dossier Approved
The Don must review and approve the Dossier before proceeding to The Grilling. If intel is incomplete, request additional reconnaissance. Only approve when confident the intel is sufficient.
Dossier File
Reconnaissance produces the dossier at:
docs/gangsta/{heist-name}/recon/{date}-recon-dossier.md
This file is read by The Grilling phase and serves as the factual foundation for all subsequent design decisions.
Checklist Before Proceeding
- Codebase thoroughly scanned
- All dependencies identified and documented
- Technical constraints documented
- Risks and unknowns surfaced
- Dossier reviewed and approved by Don