[{"data":1,"prerenderedAt":385},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline-resource-development":125,"-heist-pipeline-resource-development-surround":380},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":83,"body":127,"description":373,"extension":374,"links":375,"meta":376,"navigation":377,"path":84,"seo":378,"stem":85,"__hash__":379},"docs/3.heist-pipeline/4.resource-development.md",{"type":128,"value":129,"toc":365},"minimark",[130,134,141,144,158,167,172,212,216,219,258,262,266,270,273,283,287,290,304,307,311,355],[131,132,83],"h1",{"id":133},"resource-development",[135,136,137],"p",{},[138,139,140],"strong",{},"Phase 4 of the Heist Pipeline",[135,142,143],{},"Decompose the Contract into parallel work packages, assign territories, and create the War Plan. This is where the Underboss (COO) organizes the operation.",[135,145,146,149,150,154,157],{},[138,147,148],{},"Skill:"," ",[151,152,153],"code",{},"gangsta:resource-development",[138,155,156],{},"Skill type:"," Flexible — decomposition adapts to feature complexity",[159,160,163,166],"callout",{"icon":161,"type":162},"i-lucide-diagram","info",[138,164,165],{},"Purpose:"," Turn the Contract into an actionable plan. No implementation yet — just planning and allocation.",[168,169,171],"h2",{"id":170},"process","Process",[173,174,175,182,188,194,200,206],"ol",{},[176,177,178,181],"li",{},[138,179,180],{},"Analyze the Contract"," — Break the specification into discrete work packages",[176,183,184,187],{},[138,185,186],{},"Identify territories"," — Group related work into domains (e.g., frontend, backend, database)",[176,189,190,193],{},[138,191,192],{},"Assign work packages"," — Map each package to a territory and responsible Capo",[176,195,196,199],{},[138,197,198],{},"Estimate tributes"," — Assign resource budgets (time, complexity) to each package",[176,201,202,205],{},[138,203,204],{},"Map dependencies"," — Identify which packages must complete before others can start",[176,207,208,211],{},[138,209,210],{},"Produce the War Plan"," — Compile everything into a structured execution plan",[168,213,215],{"id":214},"output-the-war-plan","Output: The War Plan",[135,217,218],{},"The War Plan contains:",[220,221,222,228,234,240,246,252],"ul",{},[176,223,224,227],{},[138,225,226],{},"Work Packages"," — Discrete tasks with clear deliverables",[176,229,230,233],{},[138,231,232],{},"Territory Assignments"," — Which domain each package belongs to",[176,235,236,239],{},[138,237,238],{},"Tribute Estimates"," — Resource budgets per package",[176,241,242,245],{},[138,243,244],{},"Dependency Map"," — Which packages block others",[176,247,248,251],{},[138,249,250],{},"Execution Order"," — Recommended parallel/sequential task ordering",[176,253,254,257],{},[138,255,256],{},"Risk Mitigations"," — How to handle potential blockers",[168,259,261],{"id":260},"phase-gate","Phase Gate",[260,263,265],{"title":264},"GATE: War Plan Approved","The Don must review and approve the War Plan before execution. Verify work packages are appropriately scoped, dependencies are correctly mapped, tribute estimates are reasonable, and territory assignments make sense. Only approve when confident the plan is executable.",[168,267,269],{"id":268},"war-plan-file","War Plan File",[135,271,272],{},"Resource Development produces the War Plan at:",[274,275,280],"pre",{"className":276,"code":278,"language":279},[277],"language-text","docs/gangsta/{heist-name}/plans/{date}-war-plan.md\n","text",[151,281,278],{"__ignoreMap":282},"",[168,284,286],{"id":285},"parallel-vs-sequential-work","Parallel vs. Sequential Work",[135,288,289],{},"The War Plan identifies which tasks can run in parallel and which must be sequential:",[220,291,292,298],{},[176,293,294,297],{},[138,295,296],{},"Parallel tasks"," — No dependencies between them; multiple Soldiers can work simultaneously",[176,299,300,303],{},[138,301,302],{},"Sequential tasks"," — One must complete before another begins; ordered execution",[135,305,306],{},"The Underboss optimizes for maximum parallelism while respecting dependency constraints.",[168,308,310],{"id":309},"checklist-before-proceeding","Checklist Before Proceeding",[220,312,315,325,331,337,343,349],{"className":313},[314],"contains-task-list",[176,316,319,324],{"className":317},[318],"task-list-item",[320,321],"input",{"disabled":322,"type":323},true,"checkbox"," Contract fully decomposed into work packages",[176,326,328,330],{"className":327},[318],[320,329],{"disabled":322,"type":323}," Each package has clear deliverables",[176,332,334,336],{"className":333},[318],[320,335],{"disabled":322,"type":323}," Territories assigned to Capos",[176,338,340,342],{"className":339},[318],[320,341],{"disabled":322,"type":323}," Tributes estimated for all packages",[176,344,346,348],{"className":345},[318],[320,347],{"disabled":322,"type":323}," Dependencies mapped correctly",[176,350,352,354],{"className":351},[318],[320,353],{"disabled":322,"type":323}," War Plan reviewed and approved by Don",[135,356,357,361,362],{},[358,359,360],"a",{"href":80},"Previous: The Sit-Down ←"," | ",[358,363,364],{"href":88},"Next: The Hit →",{"title":282,"searchDepth":16,"depth":16,"links":366},[367,368,369,370,371,372],{"id":170,"depth":16,"text":171},{"id":214,"depth":16,"text":215},{"id":260,"depth":16,"text":261},{"id":268,"depth":16,"text":269},{"id":285,"depth":16,"text":286},{"id":309,"depth":16,"text":310},"Phase 4 — Decompose the Contract into work packages and allocate territories.","md",null,{},{"order":38},{"title":83,"description":373},"sAtP1smK87PPbVwBSfNzd6m6Kx2ryRTcKUKpJLTgV58",[381,383],{"title":79,"path":80,"stem":81,"description":382,"order":26,"children":-1},"Phase 3 — Draft the formal specification (Contract). No code allowed.",{"title":87,"path":88,"stem":89,"description":384,"order":60,"children":-1},"Phase 5 — Parallel execution by Soldiers using Test-Driven Development and tribute tracking.",1776282626914]