[{"data":1,"prerenderedAt":417},["ShallowReactive",2],{"navigation_docs":3,"-heist-pipeline-the-sit-down":129,"-heist-pipeline-the-sit-down-surround":412},[4,28,62,94,100,125],{"title":5,"path":6,"stem":7,"children":8,"order":11,"icon":27},"Getting Started","/getting-started","1.getting-started/index",[9,12,17,22],{"title":10,"path":6,"stem":7,"order":11},"What is Gangsta Agents?",1,{"title":13,"path":14,"stem":15,"order":16},"Installation","/getting-started/installation","1.getting-started/installation",2,{"title":18,"path":19,"stem":20,"order":21},"Quickstart — Your First Heist","/getting-started/quickstart","1.getting-started/quickstart",3,{"title":23,"path":24,"stem":25,"order":26},"The 1% Rule","/getting-started/the-1-percent-rule","1.getting-started/the-1-percent-rule",4,"i-lucide-rocket",{"title":29,"path":30,"stem":31,"children":32,"order":11,"icon":61},"Core Concepts","/core-concepts","2.core-concepts/index",[33,34,39,43,48,52,56],{"title":29,"path":30,"stem":31,"order":11},{"title":35,"path":36,"stem":37,"order":38},"Intent Routing","/core-concepts/intent-routing","2.core-concepts/intent-routing",5,{"title":40,"path":41,"stem":42,"order":26},"Omerta — The Five Laws","/core-concepts/omerta","2.core-concepts/omerta",{"title":44,"path":45,"stem":46,"order":47},"Spec-Driven Development","/core-concepts/spec-driven-dev","2.core-concepts/spec-driven-dev",7,{"title":49,"path":50,"stem":51,"order":16},"The Gangsta Agents Family Hierarchy","/core-concepts/the-borgata","2.core-concepts/the-borgata",{"title":53,"path":54,"stem":55,"order":21},"The Heist Pipeline","/core-concepts/the-heist","2.core-concepts/the-heist",{"title":57,"path":58,"stem":59,"order":60},"The Ledger","/core-concepts/the-ledger","2.core-concepts/the-ledger",6,"i-lucide-brain",{"title":63,"icon":64,"path":65,"stem":66,"children":67},"Heist Pipeline","i-lucide-workflow","/heist-pipeline","3.heist-pipeline",[68,70,74,78,82,86,90],{"title":53,"path":65,"stem":69,"order":11},"3.heist-pipeline/index",{"title":71,"path":72,"stem":73,"order":16},"Reconnaissance","/heist-pipeline/reconnaissance","3.heist-pipeline/1.reconnaissance",{"title":75,"path":76,"stem":77,"order":21},"The Grilling","/heist-pipeline/the-grilling","3.heist-pipeline/2.the-grilling",{"title":79,"path":80,"stem":81,"order":26},"The Sit-Down","/heist-pipeline/the-sit-down","3.heist-pipeline/3.the-sit-down",{"title":83,"path":84,"stem":85,"order":38},"Resource Development","/heist-pipeline/resource-development","3.heist-pipeline/4.resource-development",{"title":87,"path":88,"stem":89,"order":60},"Execution","/heist-pipeline/the-hit","3.heist-pipeline/5.the-hit",{"title":91,"path":92,"stem":93,"order":47},"The Delivery","/heist-pipeline/laundering","3.heist-pipeline/6.laundering",{"title":95,"path":96,"stem":97,"children":98},"Skills Reference","/skills","4.skills/index",[99],{"title":95,"path":96,"stem":97},{"title":101,"icon":102,"path":103,"stem":104,"children":105},"Advanced","i-lucide-zap","/advanced","5.advanced",[106,109,113,117,121],{"title":107,"path":103,"stem":108,"order":11},"Advanced Topics","5.advanced/index",{"title":110,"path":111,"stem":112,"order":26},"Checkpoint Recovery","/advanced/checkpoint-recovery","5.advanced/checkpoint-recovery",{"title":114,"path":115,"stem":116,"order":38},"Contributing","/advanced/contributing","5.advanced/contributing",{"title":118,"path":119,"stem":120,"order":16},"Writing Custom Skills","/advanced/custom-skills","5.advanced/custom-skills",{"title":122,"path":123,"stem":124,"order":21},"Multi-Agent Patterns","/advanced/multi-agent-patterns","5.advanced/multi-agent-patterns",{"title":126,"path":127,"stem":128,"order":60},"Glossary","/glossary","6.glossary",{"id":130,"title":79,"body":131,"description":405,"extension":406,"links":407,"meta":408,"navigation":409,"path":80,"seo":410,"stem":81,"__hash__":411},"docs/3.heist-pipeline/3.the-sit-down.md",{"type":132,"value":133,"toc":397},"minimark",[134,138,145,152,166,175,180,214,218,221,272,276,280,284,287,297,300,304,307,333,337,387],[135,136,79],"h1",{"id":137},"the-sit-down",[139,140,141],"p",{},[142,143,144],"strong",{},"Phase 3 of the Heist Pipeline",[139,146,147,148,151],{},"Draft the formal specification — the Contract. This is the most critical phase. ",[142,149,150],{},"No code is allowed."," If any code appears during The Sit-Down, the phase must restart.",[139,153,154,157,158,162,165],{},[142,155,156],{},"Skill:"," ",[159,160,161],"code",{},"gangsta:the-sit-down",[142,163,164],{},"Skill type:"," Rigid — the \"no code\" rule is non-negotiable",[167,168,171,174],"callout",{"icon":169,"type":170},"i-lucide-ban","danger",[142,172,173],{},"No code allowed during The Sit-Down."," This phase produces a specification, not an implementation. If code appears, restart the phase.",[176,177,179],"h2",{"id":178},"process","Process",[181,182,183,190,196,202,208],"ol",{},[184,185,186,189],"li",{},[142,187,188],{},"Review the Dossier"," — Ground the spec in verified intel from Reconnaissance",[184,191,192,195],{},[142,193,194],{},"Incorporate Grilling Conclusions"," — Include the design decisions from The Grilling",[184,197,198,201],{},[142,199,200],{},"Draft the Contract"," — Write the formal specification document",[184,203,204,207],{},[142,205,206],{},"Review for completeness"," — Ensure scope, out-of-scope, acceptance criteria, and rules are all present",[184,209,210,213],{},[142,211,212],{},"Present for signature"," — The Don reviews and signs the Contract",[176,215,217],{"id":216},"output-the-contract","Output: The Contract",[139,219,220],{},"The Contract is the authoritative source of truth for the entire Heist. It includes:",[222,223,224,230,236,242,248,254,260,266],"ul",{},[184,225,226,229],{},[142,227,228],{},"Objective"," — What's being built and why",[184,231,232,235],{},[142,233,234],{},"Requirements"," — Functional and non-functional requirements",[184,237,238,241],{},[142,239,240],{},"Architectural Decisions"," — Key design choices and their rationale",[184,243,244,247],{},[142,245,246],{},"Grilling Conclusions"," — Debated decisions and rejected alternatives",[184,249,250,253],{},[142,251,252],{},"Applicable Constitution Rules"," — Project-specific rules that apply",[184,255,256,259],{},[142,257,258],{},"Acceptance Criteria"," — How success is verified",[184,261,262,265],{},[142,263,264],{},"Out of Scope"," — What's explicitly not being built",[184,267,268,271],{},[142,269,270],{},"Open Risks"," — Known risks with severity and mitigation",[176,273,275],{"id":274},"phase-gate","Phase Gate",[274,277,279],{"title":278},"GATE: Contract Signed","The Don must review and sign the Contract before proceeding. Verify every requirement is testable, scope matches expectations, out-of-scope items are listed, and acceptance criteria are clear. Only sign when confident the Contract is complete and correct.",[176,281,283],{"id":282},"contract-file","Contract File",[139,285,286],{},"The Sit-Down produces the Contract at:",[288,289,294],"pre",{"className":290,"code":292,"language":293},[291],"language-text","docs/gangsta/{heist-name}/specs/{date}-contract.md\n","text",[159,295,292],{"__ignoreMap":296},"",[139,298,299],{},"This file is referenced during The Hit when verifying that implementation matches specification.",[176,301,303],{"id":302},"spec-is-law","Spec is Law",[139,305,306],{},"The Contract is governed by Omerta Law #5:",[167,308,311,316,319],{"icon":309,"type":310},"i-lucide-scroll","info",[139,312,313],{},[142,314,315],{},"If code contradicts the Contract, revise the Contract — not the code.",[139,317,318],{},"The spec is the source of truth. During The Hit, if implementation reveals a spec issue:",[181,320,321,324,327,330],{},[184,322,323],{},"Stop implementation",[184,325,326],{},"Propose a Contract revision",[184,328,329],{},"Get Don approval for the revision",[184,331,332],{},"Resume implementation",[176,334,336],{"id":335},"checklist-before-proceeding","Checklist Before Proceeding",[222,338,341,351,357,363,369,375,381],{"className":339},[340],"contains-task-list",[184,342,345,350],{"className":343},[344],"task-list-item",[346,347],"input",{"disabled":348,"type":349},true,"checkbox"," Dossier findings incorporated",[184,352,354,356],{"className":353},[344],[346,355],{"disabled":348,"type":349}," Grilling Conclusions incorporated",[184,358,360,362],{"className":359},[344],[346,361],{"disabled":348,"type":349}," All requirements are testable",[184,364,366,368],{"className":365},[344],[346,367],{"disabled":348,"type":349}," Out-of-scope items explicitly listed",[184,370,372,374],{"className":371},[344],[346,373],{"disabled":348,"type":349}," Acceptance criteria are clear and measurable",[184,376,378,380],{"className":377},[344],[346,379],{"disabled":348,"type":349}," Open risks documented",[184,382,384,386],{"className":383},[344],[346,385],{"disabled":348,"type":349}," Contract reviewed and signed by Don",[139,388,389,393,394],{},[390,391,392],"a",{"href":76},"Previous: The Grilling ←"," | ",[390,395,396],{"href":84},"Next: Resource Development →",{"title":296,"searchDepth":16,"depth":16,"links":398},[399,400,401,402,403,404],{"id":178,"depth":16,"text":179},{"id":216,"depth":16,"text":217},{"id":274,"depth":16,"text":275},{"id":282,"depth":16,"text":283},{"id":302,"depth":16,"text":303},{"id":335,"depth":16,"text":336},"Phase 3 — Draft the formal specification (Contract). No code allowed.","md",null,{},{"order":26},{"title":79,"description":405},"UsACaLv0xFw6-Ftzqg-uixQ4pgqeHBEtzz_tQEBTwqo",[413,415],{"title":75,"path":76,"stem":77,"description":414,"order":21,"children":-1},"Phase 2 — Adversarial debate between proposer and devil's advocate to surface risks and edge cases.",{"title":83,"path":84,"stem":85,"description":416,"order":38,"children":-1},"Phase 4 — Decompose the Contract into work packages and allocate territories.",1776673363026]