Skip to content

Web Open Font Format 2 (.woff2)

.woff2 file signature | application/octet-stream

WOFF File Format 2.0[65]

Safe

Magic Bytes

Offset 0
77 4F 46 32

Sources: Wikipedia, Gary Kessler

Extension

.woff2

MIME Type

application/octet-stream

Byte Offset

0

Risk Level

Safe

Validation Code

How to validate .woff2 files in Python

Python
def is_woff2(file_path: str) -> bool:
    """Check if file is a valid WOFF2 by magic bytes."""
    signature = bytes([0x77, 0x4F, 0x46, 0x32])
    with open(file_path, "rb") as f:
        return f.read(4) == signature

How to validate .woff2 files in Node.js

Node.js
function isWOFF2(buffer: Buffer): boolean {
  const signature = Buffer.from([0x77, 0x4F, 0x46, 0x32]);
  return buffer.subarray(0, 4).equals(signature);
}

How to validate .woff2 files in Go

Go
func IsWOFF2(data []byte) bool {
    signature := []byte{0x77, 0x4F, 0x46, 0x32}
    if len(data) < 4 {
        return false
    }
    return bytes.Equal(data[:4], signature)
}

API Endpoint

GET /api/v1/woff2
curl https://filesignature.org/api/v1/woff2

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .woff2 file?

A .woff2 file is a Web Open Font Format 2 file. WOFF File Format 2.0[65]

What are the magic bytes for .woff2 files?

The magic bytes for Web Open Font Format 2 files are 77 4F 46 32 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .woff2 file?

To validate a .woff2 file, read the first bytes of the file and compare them against the known magic bytes (77 4F 46 32) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .woff2 files?

There is no officially registered MIME type for .woff2 files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .woff2 files?

Web Open Font Format 2 (.woff2) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.