[{"data":1,"prerenderedAt":342},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline-the-grilling":125,"-heist-pipeline-the-grilling-surround":337},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":75,"body":127,"description":330,"extension":331,"links":332,"meta":333,"navigation":334,"path":76,"seo":335,"stem":77,"__hash__":336},"docs/3.heist-pipeline/2.the-grilling.md",{"type":128,"value":129,"toc":323},"minimark",[130,134,141,144,158,167,172,175,209,213,216,243,247,251,255,258,268,271,275,313],[131,132,75],"h1",{"id":133},"the-grilling",[135,136,137],"p",{},[138,139,140],"strong",{},"Phase 2 of the Heist Pipeline",[135,142,143],{},"Adversarial brainstorming — a structured debate between a Proposer and a Devil's Advocate to surface risks, edge cases, and trade-offs that single-perspective design misses.",[135,145,146,149,150,154,157],{},[138,147,148],{},"Skill:"," ",[151,152,153],"code",{},"gangsta:the-grilling",[138,155,156],{},"Skill type:"," Flexible — debate depth adapts to feature complexity",[159,160,163,166],"callout",{"icon":161,"type":162},"i-lucide-flame","info",[138,164,165],{},"Purpose:"," Challenge assumptions before committing to a design. It's better to find weaknesses through debate than through production failures.",[168,169,171],"h2",{"id":170},"process","Process",[135,173,174],{},"The Grilling uses multi-agent debate:",[176,177,178,185,191,197,203],"ol",{},[179,180,181,184],"li",{},[138,182,183],{},"Proposer presents"," — One agent argues for the best approach based on the Dossier",[179,186,187,190],{},[138,188,189],{},"Devil's Advocate challenges"," — Another agent attacks every assumption, identifies risks, and proposes alternatives",[179,192,193,196],{},[138,194,195],{},"Multiple rounds"," — The debate continues through several rounds until positions stabilize",[179,198,199,202],{},[138,200,201],{},"Consensus formation"," — Areas of agreement and disagreement are documented",[179,204,205,208],{},[138,206,207],{},"Produce Grilling Conclusions"," — Formal documentation of the outcome",[168,210,212],{"id":211},"output-grilling-conclusions","Output: Grilling Conclusions",[135,214,215],{},"The Grilling Conclusions document contains:",[217,218,219,225,231,237],"ul",{},[179,220,221,224],{},[138,222,223],{},"Key Decisions"," — What was agreed upon and why",[179,226,227,230],{},[138,228,229],{},"Rejected Alternatives"," — Approaches considered and rejected, with reasoning",[179,232,233,236],{},[138,234,235],{},"Unresolved Objections"," — Disagreements that couldn't be settled (escalated to Don)",[179,238,239,242],{},[138,240,241],{},"Risk Assessment"," — Identified risks with severity and mitigation strategies",[168,244,246],{"id":245},"phase-gate","Phase Gate",[245,248,250],{"title":249},"GATE: Consensus Approved","The Don must review and approve the Grilling Conclusions before proceeding. If you disagree with key decisions, request additional debate rounds or override as the Don. Only approve when confident in the design direction.",[168,252,254],{"id":253},"grilling-file","Grilling File",[135,256,257],{},"The Grilling produces conclusions at:",[259,260,265],"pre",{"className":261,"code":263,"language":264},[262],"language-text","docs/gangsta/{heist-name}/specs/{date}-contract.md\n","text",[151,266,263],{"__ignoreMap":267},"",[135,269,270],{},"The conclusions are incorporated into the Contract during The Sit-Down.",[168,272,274],{"id":273},"checklist-before-proceeding","Checklist Before Proceeding",[217,276,279,289,295,301,307],{"className":277},[278],"contains-task-list",[179,280,283,288],{"className":281},[282],"task-list-item",[284,285],"input",{"disabled":286,"type":287},true,"checkbox"," All major design approaches debated",[179,290,292,294],{"className":291},[282],[284,293],{"disabled":286,"type":287}," Risks identified and documented",[179,296,298,300],{"className":297},[282],[284,299],{"disabled":286,"type":287}," Alternatives considered and either accepted or rejected with reasoning",[179,302,304,306],{"className":303},[282],[284,305],{"disabled":286,"type":287}," Unresolved objections escalated to Don",[179,308,310,312],{"className":309},[282],[284,311],{"disabled":286,"type":287}," Consensus approved by Don",[135,314,315,319,320],{},[316,317,318],"a",{"href":72},"Previous: Reconnaissance ←"," | ",[316,321,322],{"href":80},"Next: The Sit-Down →",{"title":267,"searchDepth":16,"depth":16,"links":324},[325,326,327,328,329],{"id":170,"depth":16,"text":171},{"id":211,"depth":16,"text":212},{"id":245,"depth":16,"text":246},{"id":253,"depth":16,"text":254},{"id":273,"depth":16,"text":274},"Phase 2 — Adversarial debate between proposer and devil's advocate to surface risks and edge cases.","md",null,{},{"order":21},{"title":75,"description":330},"BVa6MITOD1zoKbRU3mrYfEc8uJtFex6vZXQQhQZRP-A",[338,340],{"title":71,"path":72,"stem":73,"description":339,"order":16,"children":-1},"Phase 1 — Gather intel on the codebase, requirements, and constraints before any design begins.",{"title":79,"path":80,"stem":81,"description":341,"order":26,"children":-1},"Phase 3 — Draft the formal specification (Contract). No code allowed.",1776282626914]