[{"data":1,"prerenderedAt":479},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline-laundering":129,"-heist-pipeline-laundering-surround":474},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":91,"body":131,"description":467,"extension":468,"links":469,"meta":470,"navigation":471,"path":92,"seo":472,"stem":93,"__hash__":473},"docs/3.heist-pipeline/6.laundering.md",{"type":132,"value":133,"toc":453},"minimark",[134,138,145,148,162,171,176,216,220,227,260,264,267,272,283,287,298,302,313,317,320,349,353,357,361,364,393,397,447],[135,136,91],"h1",{"id":137},"the-delivery",[139,140,141],"p",{},[142,143,144],"strong",{},"Phase 6 of the Heist Pipeline",[139,146,147],{},"Verification and integration. The Consigliere reviews all deliverables against the Contract, the code is integrated, and The Ledger is updated with insights and fails. The output is clean, production-ready code.",[139,149,150,153,154,158,161],{},[142,151,152],{},"Skill:"," ",[155,156,157],"code",{},"gangsta:laundering",[142,159,160],{},"Skill type:"," Flexible — verification adapts to project complexity",[163,164,167,170],"callout",{"icon":165,"type":166},"i-lucide-check-circle","info",[142,168,169],{},"Purpose:"," Ensure the final product matches the Contract, is properly integrated, and that lessons learned are preserved for future Heists.",[172,173,175],"h2",{"id":174},"process","Process",[177,178,179,186,192,198,204,210],"ol",{},[180,181,182,185],"li",{},[142,183,184],{},"Consigliere review"," — Architectural advisor reviews all code against the Contract",[180,187,188,191],{},[142,189,190],{},"Integration testing"," — Verify all components work together correctly",[180,193,194,197],{},[142,195,196],{},"Acceptance verification"," — Check each acceptance criterion from the Contract",[180,199,200,203],{},[142,201,202],{},"Ledger update"," — Record insights (what worked) and fails (what didn't)",[180,205,206,209],{},[142,207,208],{},"Constitution amendments"," — Propose new rules based on lessons learned",[180,211,212,215],{},[142,213,214],{},"Final delivery"," — Clean, verified, production-ready code",[172,217,219],{"id":218},"consigliere-review","Consigliere Review",[139,221,222,223,226],{},"The Consigliere (",[155,224,225],{},"gangsta:the-consigliere",") provides an impartial architectural review:",[228,229,230,236,242,248,254],"ul",{},[180,231,232,235],{},[142,233,234],{},"Code quality"," — Does the implementation follow established patterns?",[180,237,238,241],{},[142,239,240],{},"Security"," — Are there vulnerabilities or security concerns?",[180,243,244,247],{},[142,245,246],{},"Performance"," — Are there bottlenecks or inefficiencies?",[180,249,250,253],{},[142,251,252],{},"Contract compliance"," — Does the code match the signed specification?",[180,255,256,259],{},[142,257,258],{},"Test coverage"," — Are edge cases covered?",[172,261,263],{"id":262},"ledger-update","Ledger Update",[139,265,266],{},"This is when institutional memory is captured:",[268,269,271],"h3",{"id":270},"insights","Insights",[228,273,274,277,280],{},[180,275,276],{},"Successful patterns that should be reused",[180,278,279],{},"Non-obvious approaches that worked well",[180,281,282],{},"Domain knowledge the Don shared during the Heist",[268,284,286],{"id":285},"fails","Fails",[228,288,289,292,295],{},[180,290,291],{},"Approaches that caused rework or confusion",[180,293,294],{},"Mistakes that should not be repeated",[180,296,297],{},"Process inefficiencies discovered",[268,299,301],{"id":300},"constitution","Constitution",[228,303,304,307,310],{},[180,305,306],{},"New rules proposed based on this Heist's experience",[180,308,309],{},"Amendments to existing rules",[180,311,312],{},"Project-specific conventions to formalize",[172,314,316],{"id":315},"output-clean-delivery","Output: Clean Delivery",[139,318,319],{},"The final output of a Heist is:",[228,321,322,328,334,340],{},[180,323,324,327],{},[142,325,326],{},"Production-ready code"," — Verified against the Contract",[180,329,330,333],{},[142,331,332],{},"Complete test suite"," — Proving all acceptance criteria are met",[180,335,336,339],{},[142,337,338],{},"Updated Ledger"," — Insights, fails, and constitution amendments",[180,341,342,345,346],{},[142,343,344],{},"Heist archive"," — Complete documentation in ",[155,347,348],{},"docs/gangsta/",[172,350,352],{"id":351},"phase-gate","Phase Gate",[351,354,356],{"title":355},"GATE: Heist Complete","The Don verifies all acceptance criteria are met, the Consigliere review is satisfactory, the Ledger has been updated, and integration tests pass. The Don declares the Heist complete — the final stamp of approval that the feature is delivered.",[172,358,360],{"id":359},"what-happens-after-a-heist","What Happens After a Heist",[139,362,363],{},"Once the Don declares the Heist complete:",[177,365,366,375,381,387],{},[180,367,368,371,372,374],{},[142,369,370],{},"Archive"," — All Heist documentation remains in ",[155,373,348],{}," for future reference",[180,376,377,380],{},[142,378,379],{},"Ledger persists"," — Insights, fails, and constitution rules are available for future sessions",[180,382,383,386],{},[142,384,385],{},"Clean slate"," — The next feature starts a fresh Heist cycle",[180,388,389,392],{},[142,390,391],{},"Carry-forward"," — New Heists can reference previous dossiers and contracts",[172,394,396],{"id":395},"checklist-before-declaring-complete","Checklist Before Declaring Complete",[228,398,401,411,417,423,429,435,441],{"className":399},[400],"contains-task-list",[180,402,405,410],{"className":403},[404],"task-list-item",[406,407],"input",{"disabled":408,"type":409},true,"checkbox"," All acceptance criteria met",[180,412,414,416],{"className":413},[404],[406,415],{"disabled":408,"type":409}," Consigliere review completed",[180,418,420,422],{"className":419},[404],[406,421],{"disabled":408,"type":409}," Integration tests passing",[180,424,426,428],{"className":425},[404],[406,427],{"disabled":408,"type":409}," Ledger updated with insights",[180,430,432,434],{"className":431},[404],[406,433],{"disabled":408,"type":409}," Ledger updated with fails",[180,436,438,440],{"className":437},[404],[406,439],{"disabled":408,"type":409}," Constitution amendments proposed (if any)",[180,442,444,446],{"className":443},[404],[406,445],{"disabled":408,"type":409}," Don declares Heist complete",[139,448,449],{},[450,451,452],"a",{"href":88},"Previous: Execution ←",{"title":454,"searchDepth":16,"depth":16,"links":455},"",[456,457,458,463,464,465,466],{"id":174,"depth":16,"text":175},{"id":218,"depth":16,"text":219},{"id":262,"depth":16,"text":263,"children":459},[460,461,462],{"id":270,"depth":21,"text":271},{"id":285,"depth":21,"text":286},{"id":300,"depth":21,"text":301},{"id":315,"depth":16,"text":316},{"id":351,"depth":16,"text":352},{"id":359,"depth":16,"text":360},{"id":395,"depth":16,"text":396},"Phase 6 — Verification, integration, and Ledger update. Clean production-ready code.","md",null,{},{"order":47},{"title":91,"description":467},"HfMG2WuYM9Xpfsl_U2IbtINAYmz_eZUjlQJ2FZm2hTA",[475,477],{"title":87,"path":88,"stem":89,"description":476,"order":60,"children":-1},"Phase 5 — Parallel implementation by Workers using Test-Driven Development and budget tracking.",{"title":95,"path":96,"stem":97,"description":478,"children":-1},"All 20 battle-tested Gangsta Agents skills — each a pure markdown file that can be installed to any AI agent platform.",1776673363026]