At the current stage and for the list of allowed assets and tokens there is no reentrancy risk, because ERC20 tokens are not vulnerable to reentrancy attacks.
However, if additional tokens will be supported at a later stage of the project, the team needs to consider that certain exotic ERC20 tokens may provide hooks which allow reentrancy attacks, because the Checks-Effects-Interaction pattern is not respected in this function.
As a good coding/security practice, always apply the Checks-Effects-Interaction pattern.
Risk of reentrancy attack for ERC20 tokens that provide hooks.
Manual Review
Respect the Checks-Effects-Interaction pattern and place the line of code that modifies the user Position before the safe transfer method for _tstVal as well as _eurosVal :
And:
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.