[{"data":1,"prerenderedAt":514},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-intent-routing":129,"-core-concepts-intent-routing-surround":509},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":35,"body":131,"description":502,"extension":503,"links":504,"meta":505,"navigation":506,"path":36,"seo":507,"stem":37,"__hash__":508},"docs/2.core-concepts/intent-routing.md",{"type":132,"value":133,"toc":492},"minimark",[134,138,142,147,292,296,299,378,382,385,390,393,411,415,418,431,435,443,475,479,489],[135,136,35],"h1",{"id":137},"intent-routing",[139,140,141],"p",{},"When you speak, the agent analyzes your intent and routes it to the appropriate Gangsta Agents skill. This routing is automatic — powered by the 1% Rule — but understanding the mapping helps you work more effectively.",[143,144,146],"h2",{"id":145},"intent-skill-mapping","Intent → Skill Mapping",[148,149,150,166],"table",{},[151,152,153],"thead",{},[154,155,156,160,163],"tr",{},[157,158,159],"th",{},"User Intent",[157,161,162],{},"Action",[157,164,165],{},"Skill Invoked",[167,168,169,187,202,217,234,247,262,277],"tbody",{},[154,170,171,178,181],{},[172,173,174],"td",{},[175,176,177],"strong",{},"Build something new",[172,179,180],{},"Start a Heist",[172,182,183],{},[184,185,186],"code",{},"gangsta:reconnaissance",[154,188,189,194,197],{},[172,190,191],{},[175,192,193],{},"Fix a bug or issue",[172,195,196],{},"Get diagnosis first",[172,198,199],{},[184,200,201],{},"gangsta:the-consigliere",[154,203,204,209,212],{},[172,205,206],{},[175,207,208],{},"Debug a problem",[172,210,211],{},"Systematic root-cause analysis",[172,213,214],{},[184,215,216],{},"gangsta:interrogation-debugging",[154,218,219,224,227],{},[172,220,221],{},[175,222,223],{},"Continue existing work",[172,225,226],{},"Resume from checkpoint",[172,228,229,230,233],{},"Check ",[184,231,232],{},"docs/gangsta/"," for files",[154,235,236,241,244],{},[172,237,238],{},[175,239,240],{},"Ask a question",[172,242,243],{},"Answer directly",[172,245,246],{},"No skill needed",[154,248,249,254,257],{},[172,250,251],{},[175,252,253],{},"Review or audit",[172,255,256],{},"Structured assessment",[172,258,259],{},[184,260,261],{},"gangsta:audit-review",[154,263,264,269,272],{},[172,265,266],{},[175,267,268],{},"Write tests first",[172,270,271],{},"TDD cycle",[172,273,274],{},[184,275,276],{},"gangsta:drill-tdd",[154,278,279,284,287],{},[172,280,281],{},[175,282,283],{},"Process feedback",[172,285,286],{},"Rigorous review",[172,288,289],{},[184,290,291],{},"gangsta:receiving-orders",[143,293,295],{"id":294},"skill-priority","Skill Priority",[139,297,298],{},"When multiple skills could apply, routing follows this order:",[300,301,302,333,356],"ol",{},[303,304,305,308,309,312,313,312,316,319],"li",{},[175,306,307],{},"Process skills first"," — ",[184,310,311],{},"reconnaissance",", ",[184,314,315],{},"interrogation-debugging",[184,317,318],{},"drill-tdd",[320,321,322,330],"ul",{},[303,323,324,325,329],{},"These determine ",[326,327,328],"em",{},"how"," to approach the task",[303,331,332],{},"They set up the methodology before any work begins",[303,334,335,308,338,312,341,344],{},[175,336,337],{},"Orchestration skills second",[184,339,340],{},"the-underboss",[184,342,343],{},"the-capo",[320,345,346,353],{},[303,347,348,349,352],{},"These manage ",[326,350,351],{},"who"," does what",[303,354,355],{},"They decompose work after the approach is established",[303,357,358,308,361,312,364,367],{},[175,359,360],{},"Implementation skills third",[184,362,363],{},"the-hit",[184,365,366],{},"resource-development",[320,368,369,375],{},[303,370,371,372],{},"These guide ",[326,373,374],{},"execution",[303,376,377],{},"They operate within the structure established by process skills",[143,379,381],{"id":380},"skill-types","Skill Types",[139,383,384],{},"Skills come in two flavors:",[386,387,389],"h3",{"id":388},"rigid-skills","Rigid Skills",[139,391,392],{},"Must be followed exactly. Don't adapt away from the discipline.",[320,394,395,400,405],{},[303,396,397,399],{},[184,398,276],{}," — Red-Green-Refactor, no shortcuts",[303,401,402,404],{},[184,403,216],{}," — Systematic root-cause, no guessing",[303,406,407,410],{},[184,408,409],{},"gangsta:omerta"," — Laws apply always, no exceptions",[386,412,414],{"id":413},"flexible-skills","Flexible Skills",[139,416,417],{},"Adapt principles to context. The spirit matters more than the letter.",[320,419,420,425],{},[303,421,422,424],{},[184,423,186],{}," — Intel gathering adapts to codebase size",[303,426,427,430],{},[184,428,429],{},"gangsta:the-grilling"," — Debate depth adapts to feature complexity",[143,432,434],{"id":433},"common-routing-mistakes","Common Routing Mistakes",[436,437,440],"callout",{"icon":438,"type":439},"i-lucide-alert-triangle","danger",[175,441,442],{},"Anti-patterns to avoid:",[300,444,445,454,463,469],{},[303,446,447,450,451,453],{},[175,448,449],{},"Skipping reconnaissance"," — \"I already know the codebase\" → You probably don't know it as well as a systematic scan. Invoke ",[184,452,186],{},".",[303,455,456,459,460,462],{},[175,457,458],{},"Debugging without structure"," — \"Let me just try changing this line\" → Use ",[184,461,216],{}," for systematic root-cause analysis.",[303,464,465,468],{},[175,466,467],{},"Coding without a spec"," — \"I'll just start implementing\" → This violates Omerta Law #5 (Spec is Law). Run a Heist first.",[303,470,471,474],{},[175,472,473],{},"Auto-advancing phases"," — \"The dossier looks fine, let's keep going\" → Every phase gate requires explicit Don approval. No auto-advancing.",[143,476,478],{"id":477},"the-flow-in-practice","The Flow in Practice",[480,481,486],"pre",{"className":482,"code":484,"language":485},[483],"language-text","User says \"I want to add notifications\"\n  └── Intent: Build something new\n       └── Skill: gangsta:reconnaissance\n            └── Don approves Dossier\n                 └── gangsta:the-grilling\n                      └── Don approves Consensus\n                           └── gangsta:the-sit-down\n                                └── Don signs Contract\n                                     └── gangsta:resource-development\n                                          └── Don approves Execution Plan\n                                               └── gangsta:the-hit (Execution)\n                                                    └── Don approves Completion\n                                                         └── gangsta:laundering (The Delivery)\n                                                              └── Don declares Complete\n","text",[184,487,484],{"__ignoreMap":488},"",[139,490,491],{},"Each arrow represents a phase gate — a point where you must explicitly approve before proceeding.",{"title":488,"searchDepth":16,"depth":16,"links":493},[494,495,496,500,501],{"id":145,"depth":16,"text":146},{"id":294,"depth":16,"text":295},{"id":380,"depth":16,"text":381,"children":497},[498,499],{"id":388,"depth":21,"text":389},{"id":413,"depth":21,"text":414},{"id":433,"depth":16,"text":434},{"id":477,"depth":16,"text":478},"How Gangsta Agents maps user intent to the right skill invocation.","md",null,{},{"order":38},{"title":35,"description":502},"rqQQ842TOK5OkAQNzIKTTUEAT1oFDvpOgDGj02XuK-s",[510,512],{"title":29,"path":30,"stem":31,"description":511,"order":11,"children":-1},"The foundational ideas behind Gangsta Agents — the hierarchy, the pipeline, the laws, and the philosophy.",{"title":40,"path":41,"stem":42,"description":513,"order":26,"children":-1},"The five governance laws that prevent chaos in AI-assisted development.",1776673363026]