[{"data":1,"prerenderedAt":468},["ShallowReactive",2],{"navigation_docs":3,"-getting-started":129,"-getting-started-surround":465},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":10,"body":131,"description":458,"extension":459,"links":460,"meta":461,"navigation":462,"path":6,"seo":463,"stem":7,"__hash__":464},"docs/1.getting-started/index.md",{"type":132,"value":133,"toc":450},"minimark",[134,138,147,156,160,163,176,179,185,188,195],[135,136,10],"h1",{"id":137},"what-is-gangsta-agents",[139,140,141,142,146],"p",{},"Gangsta Agents is an ",[143,144,145],"strong",{},"AI agentic skills framework"," for spec-driven development. It provides a structured protocol — organized around the mafia family metaphor — that turns chaotic AI-assisted coding into disciplined, repeatable operations.",[148,149,152,155],"callout",{"icon":150,"type":151},"i-lucide-lightbulb","info",[143,153,154],{},"The core idea:"," Before you write a single line of code, you write a spec. Before you execute, you plan. The Heist Pipeline ensures every feature goes through reconnaissance, debate, and approval before implementation begins.",[157,158,23],"h2",{"id":159},"the-1-rule",[139,161,162],{},"The framework's single most important behavioral rule:",[148,164,167,168,171,172,175],{"icon":165,"type":166},"i-lucide-shield","warning","If there's even a ",[143,169,170],{},"1% chance"," a Gangsta Agents skill applies to what you're doing, you ",[143,173,174],{},"must"," invoke it. No rationalizing your way around the framework.",[139,177,178],{},"This means no skipping steps, no deciding \"this is too simple for a Heist,\" and no going straight to code. The framework exists because undisciplined AI agents produce unreliable output — the skills enforce the discipline that produces reliable results.",[139,180,181],{},[182,183,184],"a",{"href":24},"Read the full 1% Rule →",[157,186,53],{"id":187},"the-heist-pipeline",[139,189,190,191,194],{},"Every feature development cycle in Gangsta Agents is called a ",[143,192,193],{},"Heist"," — a 6-phase operational process:",[196,197,198,232,239,244,248,255,370,377,410,415,418,423,430,433,438,442,445],"pipeline-flow",{},[199,200,201,207,212,217,222,227],"ol",{},[202,203,204,206],"li",{},[143,205,71],{}," — Intel gathering, codebase exploration, requirement analysis",[202,208,209,211],{},[143,210,75],{}," — Adversarial debate between proposer and devil's advocate",[202,213,214,216],{},[143,215,79],{}," — Spec drafting (no code allowed)",[202,218,219,221],{},[143,220,83],{}," — Task decomposition, infrastructure prep",[202,223,224,226],{},[143,225,87],{}," — Parallel implementation by Workers",[202,228,229,231],{},[143,230,91],{}," — Verification, integration, Ledger update",[139,233,234,235,238],{},"Each phase has a ",[143,236,237],{},"gate"," — the Don (you) must approve before moving to the next phase. No auto-advancing. No skipping.",[139,240,241],{},[182,242,243],{"href":65},"Explore the full Heist Pipeline →",[157,245,247],{"id":246},"_20-skills-5-platforms","20 Skills, 5 Platforms",[139,249,250,251,254],{},"Gangsta Agents provides ",[143,252,253],{},"20 skills"," across three categories:",[256,257,258,274],"table",{},[259,260,261],"thead",{},[262,263,264,268,271],"tr",{},[265,266,267],"th",{},"Category",[265,269,270],{},"Skills",[265,272,273],{},"Purpose",[275,276,277,307,337],"tbody",{},[262,278,279,285,304],{},[280,281,282],"td",{},[143,283,284],{},"Hierarchy Roles",[280,286,287,291,292,291,295,291,298,291,301],{},[288,289,290],"code",{},"the-consigliere",", ",[288,293,294],{},"the-underboss",[288,296,297],{},"the-capo",[288,299,300],{},"the-ledger",[288,302,303],{},"omerta",[280,305,306],{},"Organization and governance",[262,308,309,314,334],{},[280,310,311],{},[143,312,313],{},"Heist Phases",[280,315,316,291,319,291,322,291,325,291,328,291,331],{},[288,317,318],{},"reconnaissance",[288,320,321],{},"the-grilling",[288,323,324],{},"the-sit-down",[288,326,327],{},"resource-development",[288,329,330],{},"the-hit",[288,332,333],{},"laundering",[280,335,336],{},"Structured development cycles",[262,338,339,344,367],{},[280,340,341],{},[143,342,343],{},"Dev Skills",[280,345,346,291,349,291,352,291,355,291,358,291,361,291,364],{},[288,347,348],{},"interrogation-debugging",[288,350,351],{},"drill-tdd",[288,353,354],{},"safehouse-worktrees",[288,356,357],{},"audit-review",[288,359,360],{},"receiving-orders",[288,362,363],{},"sweep-verification",[288,365,366],{},"exit-strategy",[280,368,369],{},"Tactical development tools",[139,371,372,373,376],{},"These skills run on ",[143,374,375],{},"5 platforms",":",[378,379,380,386,392,398,404],"ul",{},[202,381,382,385],{},[143,383,384],{},"Claude Code"," — Original target, full skill support",[202,387,388,391],{},[143,389,390],{},"OpenCode"," — Plugin-based integration",[202,393,394,397],{},[143,395,396],{},"Codex"," — Skills directory symlink",[202,399,400,403],{},[143,401,402],{},"Gemini CLI"," — Extension-based install",[202,405,406,409],{},[143,407,408],{},"Cursor"," — Follows Claude Code conventions",[139,411,412],{},[182,413,414],{"href":14},"Install Gangsta Agents →",[157,416,44],{"id":417},"spec-driven-development",[139,419,420,421,376],{},"At its core, Gangsta Agents enforces ",[143,422,44],{},[148,424,426,429],{"icon":425,"type":151},"i-lucide-scroll",[143,427,428],{},"Spec is Law."," Code that contradicts the spec means the spec needs revision — not the other way around. Never write code without a spec.",[139,431,432],{},"This isn't just a preference — it's Omerta Law #5. The Heist Pipeline is specifically designed to produce specs before code, debate specs before committing, and verify code against specs before delivery.",[139,434,435],{},[182,436,437],{"href":41},"Learn about Omerta Laws →",[157,439,441],{"id":440},"new-to-the-terminology","New to the Terminology?",[139,443,444],{},"Gangsta Agents uses mafia metaphors throughout — Dons, Crew Leads, Omerta, The Delivery, and more. If you're unfamiliar with these terms, the glossary covers every one:",[139,446,447],{},[182,448,449],{"href":127},"Glossary →",{"title":451,"searchDepth":16,"depth":16,"links":452},"",[453,454,455,456,457],{"id":159,"depth":16,"text":23},{"id":187,"depth":16,"text":53},{"id":246,"depth":16,"text":247},{"id":417,"depth":16,"text":44},{"id":440,"depth":16,"text":441},"An AI agentic skills framework for spec-driven development, organized around the mafia family metaphor.","md",null,{},{"order":11},{"title":10,"description":458},"VGP8n4pYOn6Dj_KceMBoFCj3F34yrTpnK7VtAD7oDws",[460,466],{"title":13,"path":14,"stem":15,"description":467,"order":16,"children":-1},"Install Gangsta Agents skills on Claude Code, GitHub Copilot, OpenCode, Codex, Gemini CLI, or Cursor.",1776673362218]