Skip to main content

GitHub Actions OIDC Federation: Stability and Performance Improvements

· One min read
Takashi Yoneuchi
CTO @ GMO Flatt Security Inc.

OIDC federation between GitHub Actions and Takumi Guard / Shisho Cloud now operates reliably even when connectivity to GitHub is unstable.

Overview

The GitHub Actions that Takumi Guard provides (e.g. flatt-security/setup-takumi-guard-npm) and the Shisho Cloud Action use the OIDC token issued by the GitHub Actions runner at runtime to obtain Shisho Cloud / Takumi credentials. To verify that token's signature, the exchange briefly reaches the GitHub-hosted endpoint token.actions.githubusercontent.com.

On 2026-05-19 we observed periods during which our token-exchange service could not intermittently reach the GitHub endpoint above. As a result, we confirmed that some customer GitHub Actions workflows ran into authentication errors.

This release improves the network configuration and the cache logic for the JWKS (JSON Web Key Set) served by token.actions.githubusercontent.com. As a result, transient connectivity failures between the two endpoints are far less likely to surface as workflow failures.

Action Required

No action is required on your side. All workflows using flatt-security/shisho-cloud-action or any of the flatt-security/setup-takumi-guard-* Actions automatically receive this improvement.

Additional Notes

If you continue to see unstable behaviour, please reach out to Support with as much relevant information as possible.