Welcome to the most comprehensive collection of half-baked, completely-not-researched, and utterly-absurd theories on how to launch a successful CSRF attack.
In this revolutionary theory, we propose that the best way to launch a CSRF attack is to simply not bother writing any actual code or research any vulnerabilities. Just sit back, relax, and let the system do all the work!