[{"data":1,"prerenderedAt":503},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-spec-driven-dev":129,"-core-concepts-spec-driven-dev-surround":498},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":44,"body":131,"description":491,"extension":492,"links":493,"meta":494,"navigation":495,"path":45,"seo":496,"stem":46,"__hash__":497},"docs/2.core-concepts/spec-driven-dev.md",{"type":132,"value":133,"toc":482},"minimark",[134,138,146,152,157,160,182,189,193,196,280,287,302,306,309,353,356,374,377,381,427,431,434,443,446,450],[135,136,44],"h1",{"id":137},"spec-driven-development",[139,140,141,145],"p",{},[142,143,144],"strong",{},"Spec is Law."," This is Omerta Law #5 and the philosophical foundation of Gangsta Agents.",[147,148,151],"callout",{"icon":149,"type":150},"i-lucide-scroll","warning","Code that contradicts the spec means the spec needs revision — not the other way around. Never write code without a spec.",[153,154,156],"h2",{"id":155},"the-problem-spec-driven-development-solves","The Problem Spec-Driven Development Solves",[139,158,159],{},"Traditional AI-assisted development follows a dangerous pattern:",[161,162,163,167,170,173,176,179],"ol",{},[164,165,166],"li",{},"User describes what they want",[164,168,169],{},"AI agent starts writing code immediately",[164,171,172],{},"Code grows organically without a plan",[164,174,175],{},"Edge cases are discovered late (or never)",[164,177,178],{},"Requirements drift as implementation evolves",[164,180,181],{},"The final product doesn't match what was intended",[139,183,184,185,188],{},"Sound familiar? This is ",[142,186,187],{},"shadow development"," — code written without specification, driven by implementation convenience rather than intentional design.",[153,190,192],{"id":191},"the-spec-driven-alternative","The Spec-Driven Alternative",[139,194,195],{},"Gangsta Agents enforces spec-driven development through the Heist Pipeline:",[197,198,199,215],"table",{},[200,201,202],"thead",{},[203,204,205,209,212],"tr",{},[206,207,208],"th",{},"Phase",[206,210,211],{},"What Happens",[206,213,214],{},"Code Allowed?",[216,217,218,229,238,251,260,270],"tbody",{},[203,219,220,223,226],{},[221,222,71],"td",{},[221,224,225],{},"Gather intel, understand context",[221,227,228],{},"❌ No",[203,230,231,233,236],{},[221,232,75],{},[221,234,235],{},"Debate approaches, surface risks",[221,237,228],{},[203,239,240,242,245],{},[221,241,79],{},[221,243,244],{},"Write the specification (Contract)",[221,246,247,248],{},"❌ ",[142,249,250],{},"Absolutely not",[203,252,253,255,258],{},[221,254,83],{},[221,256,257],{},"Plan tasks and allocate work",[221,259,228],{},[203,261,262,264,267],{},[221,263,87],{},[221,265,266],{},"Implement the spec",[221,268,269],{},"✅ Yes",[203,271,272,274,277],{},[221,273,91],{},[221,275,276],{},"Verify against the spec",[221,278,279],{},"❌ Only review",[139,281,282,283,286],{},"Notice that ",[142,284,285],{},"code is only written during one phase"," — Execution. And by that point, you have:",[288,289,290,293,296,299],"ul",{},[164,291,292],{},"A Dossier that proves you understand the codebase",[164,294,295],{},"Grilling Conclusions that show you've debated alternatives",[164,297,298],{},"A signed Contract that defines exactly what will be built",[164,300,301],{},"An Execution Plan that breaks the work into manageable tasks",[153,303,305],{"id":304},"the-contract-source-of-truth","The Contract: Source of Truth",[139,307,308],{},"The Contract produced during The Sit-Down is the authoritative document. It includes:",[288,310,311,317,323,329,335,341,347],{},[164,312,313,316],{},[142,314,315],{},"Objective"," — What's being built and why",[164,318,319,322],{},[142,320,321],{},"Requirements"," — Functional and non-functional",[164,324,325,328],{},[142,326,327],{},"Architectural Decisions"," — Key design choices and rationale",[164,330,331,334],{},[142,332,333],{},"Grilling Conclusions"," — What was debated and decided",[164,336,337,340],{},[142,338,339],{},"Applicable Rules"," — Which constitution rules apply",[164,342,343,346],{},[142,344,345],{},"Acceptance Criteria"," — How to verify success",[164,348,349,352],{},[142,350,351],{},"Out of Scope"," — What's explicitly not being built",[139,354,355],{},"If during Execution, a developer discovers the spec is wrong, the correct process is:",[161,357,358,363,369],{},[164,359,360],{},[142,361,362],{},"Stop implementation",[164,364,365,368],{},[142,366,367],{},"Revise the Contract"," (with Don approval)",[164,370,371],{},[142,372,373],{},"Then resume implementation",[139,375,376],{},"This is not bureaucracy — it's discipline. Every spec revision is tracked and intentional.",[153,378,380],{"id":379},"spec-vs-code-priority","Spec vs. Code Priority",[197,382,383,393],{},[200,384,385],{},[203,386,387,390],{},[206,388,389],{},"Scenario",[206,391,392],{},"Correct Action",[216,394,395,403,411,419],{},[203,396,397,400],{},[221,398,399],{},"Code works but contradicts spec",[221,401,402],{},"Revise the spec, then align the code",[203,404,405,408],{},[221,406,407],{},"Spec says X, but implementation reveals X is wrong",[221,409,410],{},"Revise the spec first, then fix the code",[203,412,413,416],{},[221,414,415],{},"Developer \"knows better\" than the spec",[221,417,418],{},"Follow the spec; propose a revision if needed",[203,420,421,424],{},[221,422,423],{},"Edge case not covered by spec",[221,425,426],{},"Add it to the spec, then implement",[153,428,430],{"id":429},"the-heist-cycle-enforces-this","The Heist Cycle Enforces This",[139,432,433],{},"The Heist Pipeline is structured specifically to prevent code-first development:",[147,435,438,439,442],{"icon":436,"type":437},"i-lucide-ban","danger","The Sit-Down (Phase 3) has an explicit rule: ",[142,440,441],{},"NO CODE ALLOWED."," If any code appears during spec drafting, the phase must restart. This is non-negotiable.",[139,444,445],{},"By the time code is written (Execution), there's no ambiguity about what to build. The spec was debated (The Grilling), documented (The Sit-Down), and decomposed (Resource Development). The implementation phase is purely execution — no design decisions, no architectural debates, no scope creep.",[153,447,449],{"id":448},"benefits","Benefits",[288,451,452,458,464,470,476],{},[164,453,454,457],{},[142,455,456],{},"Predictable outcomes"," — The spec defines success before code is written",[164,459,460,463],{},[142,461,462],{},"Auditability"," — Every design decision is documented with rationale",[164,465,466,469],{},[142,467,468],{},"No scope creep"," — The Contract defines what's in scope and what's not",[164,471,472,475],{},[142,473,474],{},"Consistent quality"," — TDD during Execution ensures code meets the spec",[164,477,478,481],{},[142,479,480],{},"Team alignment"," — Everyone works from the same specification",{"title":483,"searchDepth":16,"depth":16,"links":484},"",[485,486,487,488,489,490],{"id":155,"depth":16,"text":156},{"id":191,"depth":16,"text":192},{"id":304,"depth":16,"text":305},{"id":379,"depth":16,"text":380},{"id":429,"depth":16,"text":430},{"id":448,"depth":16,"text":449},"The philosophy at the core of Gangsta Agents — spec is law, code is implementation.","md",null,{},{"order":47},{"title":44,"description":491},"MH_9YqSVi9BJPNRQ7nbNBIgNAXZTbcLx7KafJfeEjUE",[499,501],{"title":40,"path":41,"stem":42,"description":500,"order":26,"children":-1},"The five governance laws that prevent chaos in AI-assisted development.",{"title":49,"path":50,"stem":51,"description":502,"order":16,"children":-1},"The organizational structure of a Gangsta Agents project — Don, Consigliere, Underboss, Crew Lead, Worker, and The Ledger.",1776673362218]