[{"data":1,"prerenderedAt":409},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline":129,"-heist-pipeline-surround":404},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":53,"body":131,"description":397,"extension":398,"links":399,"meta":400,"navigation":401,"path":65,"seo":402,"stem":69,"__hash__":403},"docs/3.heist-pipeline/index.md",{"type":132,"value":133,"toc":390},"minimark",[134,138,142],[135,136,53],"h1",{"id":137},"the-heist-pipeline",[139,140,141],"p",{},"Every feature development cycle in Gangsta Agents follows the same structured process — a 6-phase Heist that ensures specs are written before code, designs are debated before committing, and results are verified before delivery.",[143,144,145,150,301,305,313,322,326,329,335,341,345,348,368,373,377,387],"pipeline-flow",{},[146,147,149],"h2",{"id":148},"phase-overview","Phase Overview",[151,152,153,175],"table",{},[154,155,156],"thead",{},[157,158,159,163,166,169,172],"tr",{},[160,161,162],"th",{},"#",[160,164,165],{},"Phase",[160,167,168],{},"Skill",[160,170,171],{},"Gate",[160,173,174],{},"Output",[176,177,178,201,221,241,261,281],"tbody",{},[157,179,180,184,189,195,198],{},[181,182,183],"td",{},"1",[181,185,186],{},[187,188,71],"a",{"href":72},[181,190,191],{},[192,193,194],"code",{},"gangsta:reconnaissance",[181,196,197],{},"Dossier approved",[181,199,200],{},"Intel report",[157,202,203,206,210,215,218],{},[181,204,205],{},"2",[181,207,208],{},[187,209,75],{"href":76},[181,211,212],{},[192,213,214],{},"gangsta:the-grilling",[181,216,217],{},"Consensus approved",[181,219,220],{},"Design decisions",[157,222,223,226,230,235,238],{},[181,224,225],{},"3",[181,227,228],{},[187,229,79],{"href":80},[181,231,232],{},[192,233,234],{},"gangsta:the-sit-down",[181,236,237],{},"Contract signed",[181,239,240],{},"Specification",[157,242,243,246,250,255,258],{},[181,244,245],{},"4",[181,247,248],{},[187,249,83],{"href":84},[181,251,252],{},[192,253,254],{},"gangsta:resource-development",[181,256,257],{},"Execution Plan approved",[181,259,260],{},"Task breakdown",[157,262,263,266,270,275,278],{},[181,264,265],{},"5",[181,267,268],{},[187,269,87],{"href":88},[181,271,272],{},[192,273,274],{},"gangsta:the-hit",[181,276,277],{},"Completion approved",[181,279,280],{},"Working code",[157,282,283,286,290,295,298],{},[181,284,285],{},"6",[181,287,288],{},[187,289,91],{"href":92},[181,291,292],{},[192,293,294],{},"gangsta:laundering",[181,296,297],{},"Heist complete",[181,299,300],{},"Clean delivery",[146,302,304],{"id":303},"phase-gates","Phase Gates",[139,306,307,308,312],{},"Every phase ends with a ",[309,310,311],"strong",{},"gate"," — a checkpoint requiring the Don's explicit approval. The framework never auto-advances to the next phase.",[314,315,318,321],"callout",{"icon":316,"type":317},"i-lucide-shield","warning",[309,319,320],{},"You are the Don."," Your approval is required at every gate. If the output is incomplete or incorrect, reject it. The Heist only progresses when you say so.",[146,323,325],{"id":324},"starting-a-heist","Starting a Heist",[139,327,328],{},"Express a building intention to your AI tool:",[330,331,332],"blockquote",{},[139,333,334],{},"\"I want to add user notifications to my app\"",[139,336,337,338,340],{},"The 1% Rule triggers ",[192,339,194],{}," automatically. From there, each phase flows into the next with your approval at every gate.",[146,342,344],{"id":343},"resuming-a-heist","Resuming a Heist",[139,346,347],{},"If a session is interrupted:",[349,350,351,359,362,365],"ol",{},[352,353,354,355,358],"li",{},"Check ",[192,356,357],{},"docs/gangsta/"," for checkpoint files",[352,360,361],{},"Read the latest checkpoint",[352,363,364],{},"Present the resume context to the Don",[352,366,367],{},"Continue from the last completed phase",[139,369,370],{},[187,371,372],{"href":111},"Checkpoint Recovery guide →",[146,374,376],{"id":375},"the-full-cycle","The Full Cycle",[378,379,384],"pre",{"className":380,"code":382,"language":383},[381],"language-text","Reconnaissance → The Grilling → The Sit-Down → Resource Dev → Execution → The Delivery\n     │                │                │               │            │             │\n  Dossier         Consensus        Contract       Execution     Code +         Clean\n  approved         approved          signed          Plan        Budgets      Delivery\n                                                   approved\n","text",[192,385,382],{"__ignoreMap":386},"",[139,388,389],{},"Each phase produces a concrete artifact that the next phase depends on. You cannot skip phases, and you cannot proceed without explicit approval.",{"title":386,"searchDepth":16,"depth":16,"links":391},[392,393,394,395,396],{"id":148,"depth":16,"text":149},{"id":303,"depth":16,"text":304},{"id":324,"depth":16,"text":325},{"id":343,"depth":16,"text":344},{"id":375,"depth":16,"text":376},"The 6-phase development cycle — from reconnaissance to the delivery.","md",null,{},{"order":11},{"title":53,"description":397},"Yv70029SSpo5PkVyd8bLhoExu6K6w3JnWfOTleMH9B0",[405,407],{"title":57,"path":58,"stem":59,"description":406,"order":60,"children":-1},"Gangsta Agents' institutional memory — insights, fails, and constitution rules that persist across sessions.",{"title":71,"path":72,"stem":73,"description":408,"order":16,"children":-1},"Phase 1 — Gather intel on the codebase, requirements, and constraints before any design begins.",1776673362218]