[{"data":1,"prerenderedAt":394},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-omerta":129,"-core-concepts-omerta-surround":389},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":40,"body":131,"description":382,"extension":383,"links":384,"meta":385,"navigation":386,"path":41,"seo":387,"stem":42,"__hash__":388},"docs/2.core-concepts/omerta.md",{"type":132,"value":133,"toc":373},"minimark",[134,138,142,153,158,164,167,172,188,192,197,200,204,215,219,224,231,235,246,250,255,258,262,273,277,282,285,289,303,307,310,370],[135,136,40],"h1",{"id":137},"omerta-the-five-laws",[139,140,141],"p",{},"Omerta is the code of silence — and in Gangsta Agents, it's the code of governance. Five laws that prevent the chaos typical of undisciplined AI-assisted development.",[143,144,147,148,152],"callout",{"icon":145,"type":146},"i-lucide-scale","warning","These laws are always active. They're invoked via ",[149,150,151],"code",{},"gangsta:omerta"," and govern every phase of every Heist.",[154,155,157],"h2",{"id":156},"law-1-the-introduction-rule","Law 1: The Introduction Rule",[139,159,160],{},[161,162,163],"strong",{},"No direct agent-to-agent communication.",[139,165,166],{},"Agents never talk to each other directly. All communication flows through files — checkpoints, contracts, execution plans. This prevents the \"telephone game\" problem where messages get distorted through chains of agents.",[139,168,169],{},[161,170,171],{},"In practice:",[173,174,175,179,182],"ul",{},[176,177,178],"li",{},"Workers don't message other Workers",[176,180,181],{},"Crew Leads don't message other Crew Leads",[176,183,184,185],{},"All coordination happens through shared files in ",[149,186,187],{},"docs/gangsta/",[154,189,191],{"id":190},"law-2-the-rule-of-availability","Law 2: The Rule of Availability",[139,193,194],{},[161,195,196],{},"Every state must be checkpointed to files.",[139,198,199],{},"No agent holds critical state in memory. Everything is written to disk so any agent can pick up where another left off. This is what makes Heist resumption possible.",[139,201,202],{},[161,203,171],{},[173,205,206,209,212],{},[176,207,208],{},"Dossiers, Contracts, Execution Plans — all persisted as files",[176,210,211],{},"Checkpoints written after every phase",[176,213,214],{},"Any new session can reconstruct the full state from files",[154,216,218],{"id":217},"law-3-the-rule-of-truth","Law 3: The Rule of Truth",[139,220,221],{},[161,222,223],{},"Every claim must cite its source.",[139,225,226,227,230],{},"Agents must reference where they found information. No \"I think the database uses PostgreSQL\" — instead: \"The database config in ",[149,228,229],{},"config/database.yml"," line 42 shows PostgreSQL.\" This prevents hallucination from propagating.",[139,232,233],{},[161,234,171],{},[173,236,237,240,243],{},[176,238,239],{},"File paths and line numbers for code claims",[176,241,242],{},"URLs for documentation claims",[176,244,245],{},"\"I don't know\" is acceptable; guessing is not",[154,247,249],{"id":248},"law-4-the-rule-of-budget","Law 4: The Rule of Budget",[139,251,252],{},[161,253,254],{},"Resource budgets are tracked.",[139,256,257],{},"Every task allocated to a Worker has a budget — estimated time or token cost. Budgets are tracked during Execution to prevent runaway tasks. If a task exceeds its budget, it must request an extension.",[139,259,260],{},[161,261,171],{},[173,263,264,267,270],{},[176,265,266],{},"Execution Plans include budget estimates per task",[176,268,269],{},"Workers report budget consumption during execution",[176,271,272],{},"Over-budget tasks raise a flag for Don review",[154,274,276],{"id":275},"law-5-spec-is-law","Law 5: Spec is Law",[139,278,279],{},[161,280,281],{},"If code contradicts the spec, revise the spec — not the code.",[139,283,284],{},"This is the philosophical foundation. The Contract (spec) is the authoritative source of truth. If implementation reveals a spec issue, the spec is formally revised. Code is never the primary artifact — the spec is.",[139,286,287],{},[161,288,171],{},[173,290,291,294,297,300],{},[176,292,293],{},"The Sit-Down produces the Contract",[176,295,296],{},"Execution implements the Contract",[176,298,299],{},"Deviations require a Contract amendment, not a code-first approach",[176,301,302],{},"This ensures consistency and auditability",[154,304,306],{"id":305},"why-these-laws-matter","Why These Laws Matter",[139,308,309],{},"Without Omerta, AI-assisted development degenerates:",[311,312,313,326],"table",{},[314,315,316],"thead",{},[317,318,319,323],"tr",{},[320,321,322],"th",{},"Problem",[320,324,325],{},"Law That Prevents It",[327,328,329,338,346,354,362],"tbody",{},[317,330,331,335],{},[332,333,334],"td",{},"Agents contradict each other",[332,336,337],{},"Introduction Rule",[317,339,340,343],{},[332,341,342],{},"Lost context across sessions",[332,344,345],{},"Rule of Availability",[317,347,348,351],{},[332,349,350],{},"Hallucinated facts propagated",[332,352,353],{},"Rule of Truth",[317,355,356,359],{},[332,357,358],{},"Runaway tasks consuming resources",[332,360,361],{},"Rule of Budget",[317,363,364,367],{},[332,365,366],{},"Code drifting from requirements",[332,368,369],{},"Spec is Law",[139,371,372],{},"These laws aren't bureaucratic overhead — they're the guardrails that make AI-assisted development reliable and repeatable.",{"title":374,"searchDepth":16,"depth":16,"links":375},"",[376,377,378,379,380,381],{"id":156,"depth":16,"text":157},{"id":190,"depth":16,"text":191},{"id":217,"depth":16,"text":218},{"id":248,"depth":16,"text":249},{"id":275,"depth":16,"text":276},{"id":305,"depth":16,"text":306},"The five governance laws that prevent chaos in AI-assisted development.","md",null,{},{"order":26},{"title":40,"description":382},"xQpQdhhD0gxNSO-9FLxj7cUiFPRsNV255cq0yP0fs2w",[390,392],{"title":35,"path":36,"stem":37,"description":391,"order":38,"children":-1},"How Gangsta Agents maps user intent to the right skill invocation.",{"title":44,"path":45,"stem":46,"description":393,"order":47,"children":-1},"The philosophy at the core of Gangsta Agents — spec is law, code is implementation.",1776673362218]