Skip to content

Sonic Foundry Acid Music File (.acd)

.acd file signature | application/octet-stream

Sonic Foundry Acid Music File (Sony)

Safe

Magic Bytes

Offset 0
72 69 66 66

Sources: Gary Kessler

Extension

.acd

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .acd files in Python

Python
def is_acd(file_path: str) -> bool:
    """Check if file is a valid ACD by magic bytes."""
    signature = bytes([0x72, 0x69, 0x66, 0x66])
    with open(file_path, "rb") as f:
        return f.read(4) == signature

How to validate .acd files in Node.js

Node.js
function isACD(buffer: Buffer): boolean {
  const signature = Buffer.from([0x72, 0x69, 0x66, 0x66]);
  return buffer.subarray(0, 4).equals(signature);
}

How to validate .acd files in Go

Go
func IsACD(data []byte) bool {
    signature := []byte{0x72, 0x69, 0x66, 0x66}
    if len(data) < 4 {
        return false
    }
    return bytes.Equal(data[:4], signature)
}

API Endpoint

GET /api/v1/acd
curl https://filesignature.org/api/v1/acd

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .acd file?

A .acd file is a Sonic Foundry Acid Music File file. Sonic Foundry Acid Music File (Sony)

What are the magic bytes for .acd files?

The magic bytes for Sonic Foundry Acid Music File files are 72 69 66 66 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .acd file?

To validate a .acd file, read the first bytes of the file and compare them against the known magic bytes (72 69 66 66) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .acd files?

There is no officially registered MIME type for .acd files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .acd files?

Sonic Foundry Acid Music File (.acd) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.