Skip to content

WK2 (.wk2)

.wk2 file signature | application/vnd.lotus-1-2-3;version=2

Safe

Magic Bytes

Offset 0
00 00 02 00 06 04 06 00 08 00

Sources: Apache Tika

Extension

.wk2

MIME Type

application/vnd.lotus-1-2-3;version=2

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .wk2 files in Python

Python
def is_wk2(file_path: str) -> bool:
    """Check if file is a valid WK2 by magic bytes."""
    signature = bytes([0x00, 0x00, 0x02, 0x00, 0x06, 0x04, 0x06, 0x00, 0x08, 0x00])
    with open(file_path, "rb") as f:
        return f.read(10) == signature

How to validate .wk2 files in Node.js

Node.js
function isWK2(buffer: Buffer): boolean {
  const signature = Buffer.from([0x00, 0x00, 0x02, 0x00, 0x06, 0x04, 0x06, 0x00, 0x08, 0x00]);
  return buffer.subarray(0, 10).equals(signature);
}

How to validate .wk2 files in Go

Go
func IsWK2(data []byte) bool {
    signature := []byte{0x00, 0x00, 0x02, 0x00, 0x06, 0x04, 0x06, 0x00, 0x08, 0x00}
    if len(data) < 10 {
        return false
    }
    return bytes.Equal(data[:10], signature)
}

API Endpoint

GET /api/v1/wk2
curl https://filesignature.org/api/v1/wk2

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .wk2 file?

A .wk2 file is a WK2 file.

What are the magic bytes for .wk2 files?

The magic bytes for WK2 files are 00 00 02 00 06 04 06 00 08 00 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .wk2 file?

To validate a .wk2 file, read the first bytes of the file and compare them against the known magic bytes (00 00 02 00 06 04 06 00 08 00) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .wk2 files?

The primary MIME type for .wk2 files is application/vnd.lotus-1-2-3;version=2.

Is it safe to open .wk2 files?

WK2 (.wk2) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.