[{"data":1,"prerenderedAt":423},["ShallowReactive",2],{"navigation_docs":3,"-core-concepts-the-heist":129,"-core-concepts-the-heist-surround":418},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":53,"body":131,"description":411,"extension":412,"links":413,"meta":414,"navigation":415,"path":54,"seo":416,"stem":55,"__hash__":417},"docs/2.core-concepts/the-heist.md",{"type":132,"value":133,"toc":397},"minimark",[134,138,147],[135,136,53],"h1",{"id":137},"the-heist-pipeline",[139,140,141,142,146],"p",{},"Every feature development cycle in Gangsta Agents is called a ",[143,144,145],"strong",{},"Heist"," — a structured 6-phase process that ensures specs are written before code, designs are debated before committing, and results are verified before delivery.",[148,149,151,156,161,171,178,184,190,194,201,208,213,218,222,229,235,240,245,249,256,262,267,272,276,283,293,298,303,307,314,320,325,330,334,337,346,350,353,359,365,369,372,392],"pipeline-flow",{":vertical":150},"true",[152,153,155],"h2",{"id":154},"the-six-phases","The Six Phases",[157,158,160],"h3",{"id":159},"_1-reconnaissance","1. Reconnaissance",[139,162,163,166,167],{},[143,164,165],{},"Skill:"," ",[168,169,170],"code",{},"gangsta:reconnaissance",[139,172,173,174,177],{},"Gather intel. The agent deploys associates to explore the codebase, identify patterns, find dependencies, and understand requirements. The output is a ",[143,175,176],{},"Dossier"," — a structured intelligence report.",[139,179,180,183],{},[143,181,182],{},"Gate:"," Don approves the Dossier.",[139,185,186],{},[187,188,189],"a",{"href":72},"Reconnaissance deep dive →",[157,191,193],{"id":192},"_2-the-grilling","2. The Grilling",[139,195,196,166,198],{},[143,197,165],{},[168,199,200],{},"gangsta:the-grilling",[139,202,203,204,207],{},"Adversarial debate. A Proposer argues for the best approach while a Devil's Advocate challenges every assumption. This surfaces edge cases, risks, and trade-offs that single-perspective design misses. The output is ",[143,205,206],{},"Grilling Conclusions",".",[139,209,210,212],{},[143,211,182],{}," Don approves the consensus.",[139,214,215],{},[187,216,217],{"href":76},"The Grilling deep dive →",[157,219,221],{"id":220},"_3-the-sit-down","3. The Sit-Down",[139,223,224,166,226],{},[143,225,165],{},[168,227,228],{},"gangsta:the-sit-down",[139,230,231,232,207],{},"Spec drafting. No code is allowed during this phase — only specification. The Contract defines scope, out-of-scope, acceptance criteria, architectural decisions, and applicable rules. The output is a ",[143,233,234],{},"signed Contract",[139,236,237,239],{},[143,238,182],{}," Don signs the Contract.",[139,241,242],{},[187,243,244],{"href":80},"The Sit-Down deep dive →",[157,246,248],{"id":247},"_4-resource-development","4. Resource Development",[139,250,251,166,253],{},[143,252,165],{},[168,254,255],{},"gangsta:resource-development",[139,257,258,259,207],{},"Task decomposition. The Contract is broken into parallel work packages, territories are assigned to Crew Leads, and resources are allocated. The output is an ",[143,260,261],{},"Execution Plan",[139,263,264,266],{},[143,265,182],{}," Don approves the Execution Plan.",[139,268,269],{},[187,270,271],{"href":84},"Resource Development deep dive →",[157,273,275],{"id":274},"_5-execution","5. Execution",[139,277,278,166,280],{},[143,279,165],{},[168,281,282],{},"gangsta:the-hit",[139,284,285,286,289,290,207],{},"Parallel implementation. Workers implement their assigned tasks, using TDD (",[168,287,288],{},"gangsta:drill-tdd",") for each work package. Budgets are tracked. The output is ",[143,291,292],{},"implemented code with budget reports",[139,294,295,297],{},[143,296,182],{}," Don approves completion.",[139,299,300],{},[187,301,302],{"href":88},"Execution deep dive →",[157,304,306],{"id":305},"_6-the-delivery","6. The Delivery",[139,308,309,166,311],{},[143,310,165],{},[168,312,313],{},"gangsta:laundering",[139,315,316,317,207],{},"Verification and integration. The Consigliere reviews all deliverables against the Contract. The Ledger is updated with insights and fails. The output is ",[143,318,319],{},"clean, production-ready code",[139,321,322,324],{},[143,323,182],{}," Don declares the Heist complete.",[139,326,327],{},[187,328,329],{"href":92},"The Delivery deep dive →",[152,331,333],{"id":332},"phase-gates","Phase Gates",[139,335,336],{},"Every phase ends with a gate — a checkpoint that requires the Don's explicit approval. This is non-negotiable:",[338,339,342,345],"callout",{"icon":340,"type":341},"i-lucide-shield","warning",[143,343,344],{},"No auto-advancing."," The framework never moves to the next phase without your approval. If you're unsure, ask for more information. If the output is incomplete, reject it and ask for revisions.",[152,347,349],{"id":348},"starting-a-heist","Starting a Heist",[139,351,352],{},"To start a Heist, simply express a building intention in your AI tool:",[354,355,356],"blockquote",{},[139,357,358],{},"\"I want to build a new feature\"",[139,360,361,362,364],{},"The agent will invoke ",[168,363,170],{}," automatically (the 1% Rule ensures this). From there, each phase flows into the next — with your approval at every gate.",[152,366,368],{"id":367},"resuming-a-heist","Resuming a Heist",[139,370,371],{},"If a session is interrupted, the next session can resume from the last checkpoint:",[373,374,375,383,386,389],"ol",{},[376,377,378,379,382],"li",{},"Check ",[168,380,381],{},"docs/gangsta/"," for checkpoint files",[376,384,385],{},"Read the latest checkpoint",[376,387,388],{},"Present the resume context to the Don",[376,390,391],{},"Continue from the phase where you left off",[139,393,394],{},[187,395,396],{"href":111},"Checkpoint Recovery →",{"title":398,"searchDepth":16,"depth":16,"links":399},"",[400,408,409,410],{"id":154,"depth":16,"text":155,"children":401},[402,403,404,405,406,407],{"id":159,"depth":21,"text":160},{"id":192,"depth":21,"text":193},{"id":220,"depth":21,"text":221},{"id":247,"depth":21,"text":248},{"id":274,"depth":21,"text":275},{"id":305,"depth":21,"text":306},{"id":332,"depth":16,"text":333},{"id":348,"depth":16,"text":349},{"id":367,"depth":16,"text":368},"The 6-phase development cycle that every feature goes through in Gangsta Agents.","md",null,{},{"order":21},{"title":53,"description":411},"dsW8DBxERrVNC2ffPRV5XvmrdINHf98d730RXJLXfgA",[419,421],{"title":49,"path":50,"stem":51,"description":420,"order":16,"children":-1},"The organizational structure of a Gangsta Agents project — Don, Consigliere, Underboss, Crew Lead, Worker, and The Ledger.",{"title":57,"path":58,"stem":59,"description":422,"order":60,"children":-1},"Gangsta Agents' institutional memory — insights, fails, and constitution rules that persist across sessions.",1776673363026]