Skip to content

PSAFE3 (.psafe3)

.psafe3 file signature | application/octet-stream

Password Gorilla Password Database

Safe

Magic Bytes

Offset 0
50 57 53 33

Sources: Wikipedia

Extension

.psafe3

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .psafe3 files in Python

Python
def is_psafe3(file_path: str) -> bool:
    """Check if file is a valid PSAFE3 by magic bytes."""
    signature = bytes([0x50, 0x57, 0x53, 0x33])
    with open(file_path, "rb") as f:
        return f.read(4) == signature

How to validate .psafe3 files in Node.js

Node.js
function isPSAFE3(buffer: Buffer): boolean {
  const signature = Buffer.from([0x50, 0x57, 0x53, 0x33]);
  return buffer.subarray(0, 4).equals(signature);
}

How to validate .psafe3 files in Go

Go
func IsPSAFE3(data []byte) bool {
    signature := []byte{0x50, 0x57, 0x53, 0x33}
    if len(data) < 4 {
        return false
    }
    return bytes.Equal(data[:4], signature)
}

API Endpoint

GET /api/v1/psafe3
curl https://filesignature.org/api/v1/psafe3

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .psafe3 file?

A .psafe3 file is a PSAFE3 file. Password Gorilla Password Database

What are the magic bytes for .psafe3 files?

The magic bytes for PSAFE3 files are 50 57 53 33 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .psafe3 file?

To validate a .psafe3 file, read the first bytes of the file and compare them against the known magic bytes (50 57 53 33) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .psafe3 files?

There is no officially registered MIME type for .psafe3 files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .psafe3 files?

PSAFE3 (.psafe3) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.