Skip to content

BLEND (.blend)

.blend file signature | application/octet-stream

Blender File Format[90]

Safe

Magic Bytes

Offset 0
42 4C 45 4E 44 45 52

Sources: Wikipedia

Extension

.blend

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .blend files in Python

Python
def is_blend(file_path: str) -> bool:
    """Check if file is a valid BLEND by magic bytes."""
    signature = bytes([0x42, 0x4C, 0x45, 0x4E, 0x44, 0x45, 0x52])
    with open(file_path, "rb") as f:
        return f.read(7) == signature

How to validate .blend files in Node.js

Node.js
function isBLEND(buffer: Buffer): boolean {
  const signature = Buffer.from([0x42, 0x4C, 0x45, 0x4E, 0x44, 0x45, 0x52]);
  return buffer.subarray(0, 7).equals(signature);
}

How to validate .blend files in Go

Go
func IsBLEND(data []byte) bool {
    signature := []byte{0x42, 0x4C, 0x45, 0x4E, 0x44, 0x45, 0x52}
    if len(data) < 7 {
        return false
    }
    return bytes.Equal(data[:7], signature)
}

API Endpoint

GET /api/v1/blend
curl https://filesignature.org/api/v1/blend

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .blend file?

A .blend file is a BLEND file. Blender File Format[90]

What are the magic bytes for .blend files?

The magic bytes for BLEND files are 42 4C 45 4E 44 45 52 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .blend file?

To validate a .blend file, read the first bytes of the file and compare them against the known magic bytes (42 4C 45 4E 44 45 52) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .blend files?

There is no officially registered MIME type for .blend files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .blend files?

BLEND (.blend) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.