A comprehensive metadata analyzer should find suspicious fields, but… I don’t have such a product. If you are concerned about the field code exploit discussed in recent issues of Woody’s Office Watch, try out the FieldSniffer macro in the attached document. The document contains two INCLUDETEXT exploit fields that attempt to import c:autoexec.bat and c:windowshosts. There also is an INCLUDEPICTURE field in the footer that pulls a transparent/clear one-pixel gif from an outside web site. The FieldSniffer alerts you and gives you the opportunity to review the field’s code and delete it. The UI is not very elegant, but if you want a macro to sniff your documents, rather than inspecting the fields yourself, you can try it. You could do worse.
I expect improved versions to be posted by other Loungers within hours.