HAZELRULES (.hazelrules)
.hazelrules file signature | application/octet-stream
Noodlesoft Hazel[97]
Magic Bytes
Offset 0
48 5A 4C 52 00 00 00 18
Sources: Wikipedia
Extension
.hazelrules
MIME Type
application/octet-stream
Byte Offset
0
Risk Level
Safe
Validation Code
How to validate .hazelrules files in Python
def is_hazelrules(file_path: str) -> bool:
"""Check if file is a valid HAZELRULES by magic bytes."""
signature = bytes([0x48, 0x5A, 0x4C, 0x52, 0x00, 0x00, 0x00, 0x18])
with open(file_path, "rb") as f:
return f.read(8) == signature
How to validate .hazelrules files in Node.js
function isHAZELRULES(buffer: Buffer): boolean {
const signature = Buffer.from([0x48, 0x5A, 0x4C, 0x52, 0x00, 0x00, 0x00, 0x18]);
return buffer.subarray(0, 8).equals(signature);
}
How to validate .hazelrules files in Go
func IsHAZELRULES(data []byte) bool {
signature := []byte{0x48, 0x5A, 0x4C, 0x52, 0x00, 0x00, 0x00, 0x18}
if len(data) < 8 {
return false
}
return bytes.Equal(data[:8], signature)
}
API Endpoint
/api/v1/hazelrules
curl https://filesignature.org/api/v1/hazelrules
See the full API documentation for all endpoints and parameters.
Frequently Asked Questions
What is a .hazelrules file?
A .hazelrules file is a HAZELRULES file. Noodlesoft Hazel[97]
What are the magic bytes for .hazelrules files?
The magic bytes for HAZELRULES files are 48 5A 4C 52 00 00 00 18 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.
How do I validate a .hazelrules file?
To validate a .hazelrules file, read the first bytes of the file and compare them against the known magic bytes (48 5A 4C 52 00 00 00 18) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.
What is the MIME type for .hazelrules files?
There is no officially registered MIME type for .hazelrules files. Systems typically use application/octet-stream as a generic fallback when handling this format.
Is it safe to open .hazelrules files?
HAZELRULES (.hazelrules) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.