Skip to content

TOAST (.toast)

.toast file signature | application/octet-stream

Roxio Toastdisc image file

Safe

Magic Bytes

Offset 0
45 52 02 00 00 00

Sources: Wikipedia

Extension

.toast

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .toast files in Python

Python
def is_toast(file_path: str) -> bool:
    """Check if file is a valid TOAST by magic bytes."""
    signature = bytes([0x45, 0x52, 0x02, 0x00, 0x00, 0x00])
    with open(file_path, "rb") as f:
        return f.read(6) == signature

How to validate .toast files in Node.js

Node.js
function isTOAST(buffer: Buffer): boolean {
  const signature = Buffer.from([0x45, 0x52, 0x02, 0x00, 0x00, 0x00]);
  return buffer.subarray(0, 6).equals(signature);
}

How to validate .toast files in Go

Go
func IsTOAST(data []byte) bool {
    signature := []byte{0x45, 0x52, 0x02, 0x00, 0x00, 0x00}
    if len(data) < 6 {
        return false
    }
    return bytes.Equal(data[:6], signature)
}

API Endpoint

GET /api/v1/toast
curl https://filesignature.org/api/v1/toast

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .toast file?

A .toast file is a TOAST file. Roxio Toastdisc image file

What are the magic bytes for .toast files?

The magic bytes for TOAST files are 45 52 02 00 00 00 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .toast file?

To validate a .toast file, read the first bytes of the file and compare them against the known magic bytes (45 52 02 00 00 00) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .toast files?

There is no officially registered MIME type for .toast files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .toast files?

TOAST (.toast) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.