[{"data":1,"prerenderedAt":351},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline-reconnaissance":129,"-heist-pipeline-reconnaissance-surround":346},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":71,"body":131,"description":339,"extension":340,"links":341,"meta":342,"navigation":343,"path":72,"seo":344,"stem":73,"__hash__":345},"docs/3.heist-pipeline/1.reconnaissance.md",{"type":132,"value":133,"toc":332},"minimark",[134,138,145,148,162,171,176,216,220,223,256,260,264,268,271,281,284,288,326],[135,136,71],"h1",{"id":137},"reconnaissance",[139,140,141],"p",{},[142,143,144],"strong",{},"Phase 1 of the Heist Pipeline",[139,146,147],{},"Gather intelligence before any design or code begins. The agent deploys associates to explore the codebase, identify patterns, find dependencies, and understand requirements.",[139,149,150,153,154,158,161],{},[142,151,152],{},"Skill:"," ",[155,156,157],"code",{},"gangsta:reconnaissance",[142,159,160],{},"Skill type:"," Flexible — adapt principles to context",[163,164,167,170],"callout",{"icon":165,"type":166},"i-lucide-eye","info",[142,168,169],{},"Purpose:"," Understand what exists before deciding what to build. Reconnaissance produces the intel that every subsequent phase depends on.",[172,173,175],"h2",{"id":174},"process","Process",[177,178,179,186,192,198,204,210],"ol",{},[180,181,182,185],"li",{},[142,183,184],{},"Deploy associates"," — The agent sends subagents to explore different parts of the codebase",[180,187,188,191],{},[142,189,190],{},"Scan architecture"," — Identify tech stack, directory structure, patterns, and conventions",[180,193,194,197],{},[142,195,196],{},"Map dependencies"," — Find existing modules, APIs, and services that relate to the feature",[180,199,200,203],{},[142,201,202],{},"Identify constraints"," — Document technical limitations, performance requirements, and security considerations",[180,205,206,209],{},[142,207,208],{},"Gather requirements"," — Understand what you (the Don) actually want, not just what was said",[180,211,212,215],{},[142,213,214],{},"Produce the Dossier"," — Compile findings into a structured intelligence report",[172,217,219],{"id":218},"output-the-dossier","Output: The Dossier",[139,221,222],{},"The Dossier is a structured document containing:",[224,225,226,232,238,244,250],"ul",{},[180,227,228,231],{},[142,229,230],{},"Codebase Overview"," — Architecture, tech stack, existing patterns",[180,233,234,237],{},[142,235,236],{},"Dependencies Identified"," — Related modules, APIs, services",[180,239,240,243],{},[142,241,242],{},"Constraints"," — Technical limitations, performance requirements",[180,245,246,249],{},[142,247,248],{},"Risks and Unknowns"," — What needs further investigation",[180,251,252,255],{},[142,253,254],{},"Recommended Scope"," — What reconnaissance suggests the feature should cover",[172,257,259],{"id":258},"phase-gate","Phase Gate",[258,261,263],{"title":262},"GATE: Dossier Approved","The Don must review and approve the Dossier before proceeding to The Grilling. If intel is incomplete, request additional reconnaissance. Only approve when confident the intel is sufficient.",[172,265,267],{"id":266},"dossier-file","Dossier File",[139,269,270],{},"Reconnaissance produces the dossier at:",[272,273,278],"pre",{"className":274,"code":276,"language":277},[275],"language-text","docs/gangsta/{heist-name}/recon/{date}-recon-dossier.md\n","text",[155,279,276],{"__ignoreMap":280},"",[139,282,283],{},"This file is read by The Grilling phase and serves as the factual foundation for all subsequent design decisions.",[172,285,287],{"id":286},"checklist-before-proceeding","Checklist Before Proceeding",[224,289,292,302,308,314,320],{"className":290},[291],"contains-task-list",[180,293,296,301],{"className":294},[295],"task-list-item",[297,298],"input",{"disabled":299,"type":300},true,"checkbox"," Codebase thoroughly scanned",[180,303,305,307],{"className":304},[295],[297,306],{"disabled":299,"type":300}," All dependencies identified and documented",[180,309,311,313],{"className":310},[295],[297,312],{"disabled":299,"type":300}," Technical constraints documented",[180,315,317,319],{"className":316},[295],[297,318],{"disabled":299,"type":300}," Risks and unknowns surfaced",[180,321,323,325],{"className":322},[295],[297,324],{"disabled":299,"type":300}," Dossier reviewed and approved by Don",[139,327,328],{},[329,330,331],"a",{"href":76},"Next: The Grilling →",{"title":280,"searchDepth":16,"depth":16,"links":333},[334,335,336,337,338],{"id":174,"depth":16,"text":175},{"id":218,"depth":16,"text":219},{"id":258,"depth":16,"text":259},{"id":266,"depth":16,"text":267},{"id":286,"depth":16,"text":287},"Phase 1 — Gather intel on the codebase, requirements, and constraints before any design begins.","md",null,{},{"order":16},{"title":71,"description":339},"cDIp9GYB-SrZX55ehtLmVVeDbj-917bbCUgKP5ipzFc",[347,349],{"title":53,"path":65,"stem":69,"description":348,"order":11,"children":-1},"The 6-phase development cycle — from reconnaissance to the delivery.",{"title":75,"path":76,"stem":77,"description":350,"order":21,"children":-1},"Phase 2 — Adversarial debate between proposer and devil's advocate to surface risks and edge cases.",1776673363026]