Unrealistically complicated clickjacking attacks
Clickjacking attacks rely on an attacker convincing a victim to casually interact with a malicious website, without realizing that some of the clicks may actually be delivered to another, framed origin.
Some of the reports of clickjacking attacks submitted through our form require exceptionally complex or implausible interactions with the malicious site: say, clicking 10 times, pressing "r", and then hitting Enter. When evaluating reports, we take a pragmatic approach: if we feel that a real-life attack would be very difficult to orchestrate, and the safeguarded functionality is of relatively modest value to the attacker to begin with, we will probably not reward the report.
Conclusion
When in doubt, it is always useful to put together a reasonably realistic proof-of-concept exploit and ask yourself or a fellow researcher if they would have fallen for it. If the answer is "no", we'll probably share the sentiment :-).
Unrealistic clickjacking and CSRF – ft. Reconless
Missing HTTP Security Headers – ft. LiveOverflow
Does your vulnerability have any impact? – ft. LiveOverflow