[{"data":1,"prerenderedAt":347},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline-reconnaissance":125,"-heist-pipeline-reconnaissance-surround":342},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":71,"body":127,"description":335,"extension":336,"links":337,"meta":338,"navigation":339,"path":72,"seo":340,"stem":73,"__hash__":341},"docs/3.heist-pipeline/1.reconnaissance.md",{"type":128,"value":129,"toc":328},"minimark",[130,134,141,144,158,167,172,212,216,219,252,256,260,264,267,277,280,284,322],[131,132,71],"h1",{"id":133},"reconnaissance",[135,136,137],"p",{},[138,139,140],"strong",{},"Phase 1 of the Heist Pipeline",[135,142,143],{},"Gather intelligence before any design or code begins. The agent deploys associates to explore the codebase, identify patterns, find dependencies, and understand requirements.",[135,145,146,149,150,154,157],{},[138,147,148],{},"Skill:"," ",[151,152,153],"code",{},"gangsta:reconnaissance",[138,155,156],{},"Skill type:"," Flexible — adapt principles to context",[159,160,163,166],"callout",{"icon":161,"type":162},"i-lucide-eye","info",[138,164,165],{},"Purpose:"," Understand what exists before deciding what to build. Reconnaissance produces the intel that every subsequent phase depends on.",[168,169,171],"h2",{"id":170},"process","Process",[173,174,175,182,188,194,200,206],"ol",{},[176,177,178,181],"li",{},[138,179,180],{},"Deploy associates"," — The agent sends subagents to explore different parts of the codebase",[176,183,184,187],{},[138,185,186],{},"Scan architecture"," — Identify tech stack, directory structure, patterns, and conventions",[176,189,190,193],{},[138,191,192],{},"Map dependencies"," — Find existing modules, APIs, and services that relate to the feature",[176,195,196,199],{},[138,197,198],{},"Identify constraints"," — Document technical limitations, performance requirements, and security considerations",[176,201,202,205],{},[138,203,204],{},"Gather requirements"," — Understand what the Don (you) actually wants, not just what was said",[176,207,208,211],{},[138,209,210],{},"Produce the Dossier"," — Compile findings into a structured intelligence report",[168,213,215],{"id":214},"output-the-dossier","Output: The Dossier",[135,217,218],{},"The Dossier is a structured document containing:",[220,221,222,228,234,240,246],"ul",{},[176,223,224,227],{},[138,225,226],{},"Codebase Overview"," — Architecture, tech stack, existing patterns",[176,229,230,233],{},[138,231,232],{},"Dependencies Identified"," — Related modules, APIs, services",[176,235,236,239],{},[138,237,238],{},"Constraints"," — Technical limitations, performance requirements",[176,241,242,245],{},[138,243,244],{},"Risks and Unknowns"," — What needs further investigation",[176,247,248,251],{},[138,249,250],{},"Recommended Scope"," — What reconnaissance suggests the feature should cover",[168,253,255],{"id":254},"phase-gate","Phase Gate",[254,257,259],{"title":258},"GATE: Dossier Approved","The Don must review and approve the Dossier before proceeding to The Grilling. If intel is incomplete, request additional reconnaissance. Only approve when confident the intel is sufficient.",[168,261,263],{"id":262},"dossier-file","Dossier File",[135,265,266],{},"Reconnaissance produces the dossier at:",[268,269,274],"pre",{"className":270,"code":272,"language":273},[271],"language-text","docs/gangsta/{heist-name}/recon/{date}-recon-dossier.md\n","text",[151,275,272],{"__ignoreMap":276},"",[135,278,279],{},"This file is read by The Grilling phase and serves as the factual foundation for all subsequent design decisions.",[168,281,283],{"id":282},"checklist-before-proceeding","Checklist Before Proceeding",[220,285,288,298,304,310,316],{"className":286},[287],"contains-task-list",[176,289,292,297],{"className":290},[291],"task-list-item",[293,294],"input",{"disabled":295,"type":296},true,"checkbox"," Codebase thoroughly scanned",[176,299,301,303],{"className":300},[291],[293,302],{"disabled":295,"type":296}," All dependencies identified and documented",[176,305,307,309],{"className":306},[291],[293,308],{"disabled":295,"type":296}," Technical constraints documented",[176,311,313,315],{"className":312},[291],[293,314],{"disabled":295,"type":296}," Risks and unknowns surfaced",[176,317,319,321],{"className":318},[291],[293,320],{"disabled":295,"type":296}," Dossier reviewed and approved by Don",[135,323,324],{},[325,326,327],"a",{"href":76},"Next: The Grilling →",{"title":276,"searchDepth":16,"depth":16,"links":329},[330,331,332,333,334],{"id":170,"depth":16,"text":171},{"id":214,"depth":16,"text":215},{"id":254,"depth":16,"text":255},{"id":262,"depth":16,"text":263},{"id":282,"depth":16,"text":283},"Phase 1 — Gather intel on the codebase, requirements, and constraints before any design begins.","md",null,{},{"order":16},{"title":71,"description":335},"HSHt0hZUn1r3ft0OhjiXmu_5BVZffdFx3Lj4hSIhvoo",[343,345],{"title":53,"path":65,"stem":69,"description":344,"order":11,"children":-1},"The 6-phase development cycle — from reconnaissance to laundering.",{"title":75,"path":76,"stem":77,"description":346,"order":21,"children":-1},"Phase 2 — Adversarial debate between proposer and devil's advocate to surface risks and edge cases.",1776282626914]