Flawfinder works on Unix-like systems today (it's been tested on GNU/Linux), and it should be easy to port to Windows systems. It requires Python 1.5 or greater to run (Python 1.3 or earlier won't work). It's already included in Debian and probably several other GNU/Linux distributions.
The current version of flawfinder is 0.21. Flawfinder is reliable; I've assigned it a low version number because its vulnerability database is small and needs to grow. If you want to see how it's changed, view its ChangeLog.
If you have trouble getting flawfinder here, you can download it from mirrors. For example, version 0.15 of flawfinder is available at http://packetstorm.securify.com/filedesc/flawfinder-0.15.tar.html.
If you're not sure you want to take the plunge to install the program, you can just look at the documentation in PDF or Postscript format. You can even go look at the flawfinder source code.
gunzip flawfinder-*.tar.gz tar xvf flawfinder-*.tar cd flawfinder-* su make install
For RPM files, install them as would normally install an RPM file. If you want to install the RPM file through a command line, this would be:
rpm -Uvh flawfinder-*.noarch.rpm
Until the time where we've figured out how to merge these dissimilar projects, I recommend that distributions and software development websites include both programs. Each has advantages that the other doesn't. For example, at the time of this writing advantages of Flawfinder are that it can handle internationalized programs (it knows about special calls like gettext()), it can report column numbers (as well as line numbers) of hits, and it can simply be given a directory name (it will enter the directory recursively, figure out what needs analyzing, and analyze it). In contrast, RATS can handle other languages and runs faster. Both projects are essentially automated advisors, and having two advisors look at your program is likely to be better than using only one.
You might want to look at my Secure Programming HOWTO web page.
You can also view my home page.