[{"data":1,"prerenderedAt":521},["ShallowReactive",2],{"navigation_docs":3,"-getting-started-quickstart":129,"-getting-started-quickstart-surround":516},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":18,"body":131,"description":509,"extension":510,"links":511,"meta":512,"navigation":513,"path":19,"seo":514,"stem":20,"__hash__":515},"docs/1.getting-started/quickstart.md",{"type":132,"value":133,"toc":498},"minimark",[134,138,142,156,161,164,170,182,186,189,213,221,225,232,239,243,250,267,275,282,286,293,307,310,314,317,335,339,342,356,363,367,370,486,493],[135,136,18],"h1",{"id":137},"quickstart-your-first-heist",[139,140,141],"p",{},"This guide walks you through a complete Heist cycle — the Gangsta Agents way to build a feature. By the end, you'll understand how the 6 phases work together and why structured development beats ad-hoc coding.",[143,144,146,150,151,155],"callout",{"icon":27,"type":145},"info",[147,148,149],"strong",{},"Before you start:"," Make sure you've ",[152,153,154],"a",{"href":14},"installed Gangsta Agents"," and verified the installation works.",[157,158,160],"h2",{"id":159},"step-1-express-your-intent","Step 1: Express Your Intent",[139,162,163],{},"Start a fresh session with your AI tool and tell it what you want to build:",[165,166,167],"blockquote",{},[139,168,169],{},"\"I want to add a user authentication system to my app\"",[139,171,172,173,176,177,181],{},"That's it. The ",[147,174,175],{},"1% Rule"," kicks in automatically — the agent recognizes this as a \"build something new\" intent and invokes ",[178,179,180],"code",{},"gangsta:reconnaissance",".",[157,183,185],{"id":184},"step-2-reconnaissance","Step 2: Reconnaissance",[139,187,188],{},"The agent deploys its intel-gathering skills:",[190,191,192,196,199,206],"ul",{},[193,194,195],"li",{},"Scans your codebase for existing patterns, dependencies, and architecture",[193,197,198],{},"Identifies relevant files, conventions, and constraints",[193,200,201,202,205],{},"Produces a ",[147,203,204],{},"Dossier"," — a structured report of findings",[193,207,208,209,212],{},"Asks you to ",[147,210,211],{},"approve the Dossier"," before proceeding",[143,214,217,220],{"icon":215,"type":216},"i-lucide-shield","warning",[147,218,219],{},"Phase Gate:"," You must approve the Dossier. If the intel is incomplete, ask for more reconnaissance before moving on.",[157,222,224],{"id":223},"step-3-the-grilling","Step 3: The Grilling",[139,226,227,228,231],{},"The agent runs an ",[147,229,230],{},"adversarial debate"," — a Proposer argues for the best approach while a Devil's Advocate challenges every assumption. This surfaces edge cases, risks, and trade-offs you might miss in a single-pass design.",[139,233,234,235,238],{},"Output: ",[147,236,237],{},"Grilling Conclusions"," documenting the winning approach and rejected alternatives.",[157,240,242],{"id":241},"step-4-the-sit-down","Step 4: The Sit-Down",[139,244,245,246,249],{},"Now the agent drafts the ",[147,247,248],{},"Contract"," — a formal specification document:",[190,251,252,255,258,261,264],{},[193,253,254],{},"What will be built (scope)",[193,256,257],{},"What won't be built (out of scope)",[193,259,260],{},"Acceptance criteria",[193,262,263],{},"Architectural decisions",[193,265,266],{},"Applicable constitution rules",[143,268,271,274],{"icon":269,"type":270},"i-lucide-ban","danger",[147,272,273],{},"No code allowed."," The Sit-Down is purely about specification. If any code appears, the phase must restart.",[139,276,277,278,281],{},"You review and ",[147,279,280],{},"sign the Contract"," — this is the law that governs all subsequent implementation.",[157,283,285],{"id":284},"step-5-resource-development","Step 5: Resource Development",[139,287,288,289,292],{},"The agent decomposes the Contract into an ",[147,290,291],{},"Execution Plan",":",[190,294,295,298,301,304],{},[193,296,297],{},"Breaks work into parallel task packages",[193,299,300],{},"Assigns territories (domains of responsibility)",[193,302,303],{},"Allocates resources and subagents",[193,305,306],{},"Identifies dependencies between tasks",[139,308,309],{},"You approve the Execution Plan, and implementation begins.",[157,311,313],{"id":312},"step-6-execution","Step 6: Execution",[139,315,316],{},"Workers implement the Execution Plan in parallel:",[190,318,319,322,329,332],{},[193,320,321],{},"Each worker implements their assigned tasks",[193,323,324,325,328],{},"Test-Driven Development (",[178,326,327],{},"gangsta:drill-tdd",") enforces Red-Green-Refactor",[193,330,331],{},"Budgets are tracked per task",[193,333,334],{},"Code respects the Contract — deviations require a spec revision",[157,336,338],{"id":337},"step-7-the-delivery","Step 7: The Delivery",[139,340,341],{},"The Consigliere reviews all deliverables:",[190,343,344,347,350,353],{},[193,345,346],{},"Code review against the Contract",[193,348,349],{},"Integration testing",[193,351,352],{},"The Ledger is updated with insights and fails",[193,354,355],{},"Production-ready code is delivered",[143,357,360,362],{"icon":358,"type":359},"i-lucide-check-circle","success",[147,361,219],{}," You declare the Heist complete. The feature is spec'd, built, verified, and documented.",[157,364,366],{"id":365},"the-full-pipeline","The Full Pipeline",[139,368,369],{},"Here's what your first Heist looks like end-to-end:",[371,372,373,392],"table",{},[374,375,376],"thead",{},[377,378,379,383,386,389],"tr",{},[380,381,382],"th",{},"Phase",[380,384,385],{},"Skill",[380,387,388],{},"You Do",[380,390,391],{},"Output",[393,394,395,410,425,440,456,471],"tbody",{},[377,396,397,400,404,407],{},[398,399,71],"td",{},[398,401,402],{},[178,403,180],{},[398,405,406],{},"Approve Dossier",[398,408,409],{},"Intel report",[377,411,412,414,419,422],{},[398,413,75],{},[398,415,416],{},[178,417,418],{},"gangsta:the-grilling",[398,420,421],{},"Approve Consensus",[398,423,424],{},"Design decisions",[377,426,427,429,434,437],{},[398,428,79],{},[398,430,431],{},[178,432,433],{},"gangsta:the-sit-down",[398,435,436],{},"Sign Contract",[398,438,439],{},"Specification",[377,441,442,445,450,453],{},[398,443,444],{},"Resource Dev",[398,446,447],{},[178,448,449],{},"gangsta:resource-development",[398,451,452],{},"Approve Execution Plan",[398,454,455],{},"Task breakdown",[377,457,458,460,465,468],{},[398,459,87],{},[398,461,462],{},[178,463,464],{},"gangsta:the-hit",[398,466,467],{},"Approve Completion",[398,469,470],{},"Working code",[377,472,473,475,480,483],{},[398,474,91],{},[398,476,477],{},[178,478,479],{},"gangsta:laundering",[398,481,482],{},"Declare Complete",[398,484,485],{},"Clean delivery",[143,487,489,492],{"icon":488,"type":145},"i-lucide-external-link",[147,490,491],{},"Deep dive:"," Read the full Heist Pipeline documentation for detailed checklists, gate conditions, and phase-specific processes.",[139,494,495],{},[152,496,497],{"href":65},"Continue to the Heist Pipeline →",{"title":499,"searchDepth":16,"depth":16,"links":500},"",[501,502,503,504,505,506,507,508],{"id":159,"depth":16,"text":160},{"id":184,"depth":16,"text":185},{"id":223,"depth":16,"text":224},{"id":241,"depth":16,"text":242},{"id":284,"depth":16,"text":285},{"id":312,"depth":16,"text":313},{"id":337,"depth":16,"text":338},{"id":365,"depth":16,"text":366},"Walk through your first Gangsta Agents Heist cycle from start to finish.","md",null,{},{"order":21},{"title":18,"description":509},"s-nliRDh_zSoU60jtCFBoI4pXMQubraaHNMIFObEc2I",[517,519],{"title":13,"path":14,"stem":15,"description":518,"order":16,"children":-1},"Install Gangsta Agents skills on Claude Code, GitHub Copilot, OpenCode, Codex, Gemini CLI, or Cursor.",{"title":23,"path":24,"stem":25,"description":520,"order":26,"children":-1},"The core behavioral rule of Gangsta Agents — if there's even a 1% chance a skill applies, you must invoke it.",1776673362218]