MOLE — Leaks one colour confirmed present in the hash
GHOST — Reveals one colour definitively absent from the hash
PING — Scans for repeated keys in the hash structure
PROBE — Pick any slot + any key — confirms if correct there
BUFFER — Extends intrusion window by one cycle
ROOT — Decrypts one confirmed key+position pair