The Imposter Can Access Our Inventories? (3)