[{"data":1,"prerenderedAt":413},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline-the-sit-down":125,"-heist-pipeline-the-sit-down-surround":408},[4,28,62,94,100],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Borgata Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"The Hit","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"Laundering","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"id":126,"title":79,"body":127,"description":401,"extension":402,"links":403,"meta":404,"navigation":405,"path":80,"seo":406,"stem":81,"__hash__":407},"docs/3.heist-pipeline/3.the-sit-down.md",{"type":128,"value":129,"toc":393},"minimark",[130,134,141,148,162,171,176,210,214,217,268,272,276,280,283,293,296,300,303,329,333,383],[131,132,79],"h1",{"id":133},"the-sit-down",[135,136,137],"p",{},[138,139,140],"strong",{},"Phase 3 of the Heist Pipeline",[135,142,143,144,147],{},"Draft the formal specification — the Contract. This is the most critical phase. ",[138,145,146],{},"No code is allowed."," If any code appears during The Sit-Down, the phase must restart.",[135,149,150,153,154,158,161],{},[138,151,152],{},"Skill:"," ",[155,156,157],"code",{},"gangsta:the-sit-down",[138,159,160],{},"Skill type:"," Rigid — the \"no code\" rule is non-negotiable",[163,164,167,170],"callout",{"icon":165,"type":166},"i-lucide-ban","danger",[138,168,169],{},"No code allowed during The Sit-Down."," This phase produces a specification, not an implementation. If code appears, restart the phase.",[172,173,175],"h2",{"id":174},"process","Process",[177,178,179,186,192,198,204],"ol",{},[180,181,182,185],"li",{},[138,183,184],{},"Review the Dossier"," — Ground the spec in verified intel from Reconnaissance",[180,187,188,191],{},[138,189,190],{},"Incorporate Grilling Conclusions"," — Include the design decisions from The Grilling",[180,193,194,197],{},[138,195,196],{},"Draft the Contract"," — Write the formal specification document",[180,199,200,203],{},[138,201,202],{},"Review for completeness"," — Ensure scope, out-of-scope, acceptance criteria, and rules are all present",[180,205,206,209],{},[138,207,208],{},"Present for signature"," — The Don reviews and signs the Contract",[172,211,213],{"id":212},"output-the-contract","Output: The Contract",[135,215,216],{},"The Contract is the authoritative source of truth for the entire Heist. It includes:",[218,219,220,226,232,238,244,250,256,262],"ul",{},[180,221,222,225],{},[138,223,224],{},"Objective"," — What's being built and why",[180,227,228,231],{},[138,229,230],{},"Requirements"," — Functional and non-functional requirements",[180,233,234,237],{},[138,235,236],{},"Architectural Decisions"," — Key design choices and their rationale",[180,239,240,243],{},[138,241,242],{},"Grilling Conclusions"," — Debated decisions and rejected alternatives",[180,245,246,249],{},[138,247,248],{},"Applicable Constitution Rules"," — Project-specific rules that apply",[180,251,252,255],{},[138,253,254],{},"Acceptance Criteria"," — How success is verified",[180,257,258,261],{},[138,259,260],{},"Out of Scope"," — What's explicitly not being built",[180,263,264,267],{},[138,265,266],{},"Open Risks"," — Known risks with severity and mitigation",[172,269,271],{"id":270},"phase-gate","Phase Gate",[270,273,275],{"title":274},"GATE: Contract Signed","The Don must review and sign the Contract before proceeding. Verify every requirement is testable, scope matches expectations, out-of-scope items are listed, and acceptance criteria are clear. Only sign when confident the Contract is complete and correct.",[172,277,279],{"id":278},"contract-file","Contract File",[135,281,282],{},"The Sit-Down produces the Contract at:",[284,285,290],"pre",{"className":286,"code":288,"language":289},[287],"language-text","docs/gangsta/{heist-name}/specs/{date}-contract.md\n","text",[155,291,288],{"__ignoreMap":292},"",[135,294,295],{},"This file is referenced during The Hit when verifying that implementation matches specification.",[172,297,299],{"id":298},"spec-is-law","Spec is Law",[135,301,302],{},"The Contract is governed by Omerta Law #5:",[163,304,307,312,315],{"icon":305,"type":306},"i-lucide-scroll","info",[135,308,309],{},[138,310,311],{},"If code contradicts the Contract, revise the Contract — not the code.",[135,313,314],{},"The spec is the source of truth. During The Hit, if implementation reveals a spec issue:",[177,316,317,320,323,326],{},[180,318,319],{},"Stop implementation",[180,321,322],{},"Propose a Contract revision",[180,324,325],{},"Get Don approval for the revision",[180,327,328],{},"Resume implementation",[172,330,332],{"id":331},"checklist-before-proceeding","Checklist Before Proceeding",[218,334,337,347,353,359,365,371,377],{"className":335},[336],"contains-task-list",[180,338,341,346],{"className":339},[340],"task-list-item",[342,343],"input",{"disabled":344,"type":345},true,"checkbox"," Dossier findings incorporated",[180,348,350,352],{"className":349},[340],[342,351],{"disabled":344,"type":345}," Grilling Conclusions incorporated",[180,354,356,358],{"className":355},[340],[342,357],{"disabled":344,"type":345}," All requirements are testable",[180,360,362,364],{"className":361},[340],[342,363],{"disabled":344,"type":345}," Out-of-scope items explicitly listed",[180,366,368,370],{"className":367},[340],[342,369],{"disabled":344,"type":345}," Acceptance criteria are clear and measurable",[180,372,374,376],{"className":373},[340],[342,375],{"disabled":344,"type":345}," Open risks documented",[180,378,380,382],{"className":379},[340],[342,381],{"disabled":344,"type":345}," Contract reviewed and signed by Don",[135,384,385,389,390],{},[386,387,388],"a",{"href":76},"Previous: The Grilling ←"," | ",[386,391,392],{"href":84},"Next: Resource Development →",{"title":292,"searchDepth":16,"depth":16,"links":394},[395,396,397,398,399,400],{"id":174,"depth":16,"text":175},{"id":212,"depth":16,"text":213},{"id":270,"depth":16,"text":271},{"id":278,"depth":16,"text":279},{"id":298,"depth":16,"text":299},{"id":331,"depth":16,"text":332},"Phase 3 — Draft the formal specification (Contract). No code allowed.","md",null,{},{"order":26},{"title":79,"description":401},"UsACaLv0xFw6-Ftzqg-uixQ4pgqeHBEtzz_tQEBTwqo",[409,411],{"title":75,"path":76,"stem":77,"description":410,"order":21,"children":-1},"Phase 2 — Adversarial debate between proposer and devil's advocate to surface risks and edge cases.",{"title":83,"path":84,"stem":85,"description":412,"order":38,"children":-1},"Phase 4 — Decompose the Contract into work packages and allocate territories.",1776282626914]